Impact
A vulnerability exists in the Cisco Nexus 9000 Series Fabric Switches operating in Application Centric Infrastructure (ACI) mode where insufficient validation of Ethernet frames processed by the out‑of‑band management interface allows an unauthenticated, adjacent attacker to inject a crafted frame. If the exploit succeeds, the device will unexpectedly reload, resulting in a denial of service of the switch. The impact is the loss of network connectivity but does not directly affect data confidentiality or integrity.
Affected Systems
Cisco NX‑OS System Software in ACI Mode on Nexus 9000 Series Fabric Switches. No specific affected versions are listed in the CNA data; the only affected component is the out‑of‑band management interface.
Risk and Exploitability
The CVSS base score is 7.4, indicating a high severity. The EPSS score is less than 1 %, suggesting a very low probability of observed exploitation. The vulnerability is not listed in the CISA KEV catalog. The likely attack vector is the out‑of‑band management interface; an attacker must be adjacent to the switch’s management network and does not need credentials. Successful exploitation causes the switch to reboot, disrupting services for potentially all users connected to the affected fabric.
OpenCVE Enrichment