Impact
The identified flaw resides in the SNMP subsystem of Cisco Nexus 9000 Series Fabric Switches operating in ACI mode. Improper parsing of SNMP requests allows an authenticated remote attacker, using a valid SNMP read‑only community string for SNMPv1/v2c or a valid SNMPv3 credential, to continuously bombard the device with requests to a specific MIB. Sustained traffic can force the kernel to panic, triggering a device reload and producing a denial‑of‑service condition. The weakness is classified as out‑of‑bounds processing (CWE‑789).
Affected Systems
Cisco NX-OS System Software in ACI mode running on Nexus 9000 Series Fabric Switches is affected. Version information is not provided in the advisory, so the specific firmware releases impacted are unknown.
Risk and Exploitability
The CVSS score of 7.7 indicates a moderate to high severity. The EPSS value of less than 1% means that, although the flaw exists, it is currently considered unlikely to be exploited in the wild. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires authenticated access to SNMP, which is commonly available in many networks, making the potential impact significant if mitigations are absent.
OpenCVE Enrichment