Impact
A logic error in the Ethernet VPN (EVPN) Layer 2 ingress processing of Cisco Nexus 3600 Platform Switches and Cisco Nexus 9500‑R Series Switching Platforms allows an unauthenticated, Layer 2‑adjacent attacker to send a stream of crafted Ethernet frames that triggers a Layer 2 Virtual eXtensible LAN (VxLAN) traffic loop. The loop can oversubscribe network interface bandwidth, causing all data‑plane traffic to be dropped and resulting in a denial of service.
Affected Systems
The vulnerability affects Cisco Nexus 3600 and Cisco Nexus 9500‑R series switches running Cisco NX‑OS Software. No specific OS version range is supplied in the advisory, so any deployed NX‑OS firmware on these platforms should be examined for the fix.
Risk and Exploitability
With a CVSS score of 7.4 the vulnerability is classified as high severity. The EPSS score is below 1%, indicating a low probability of exploitation, and the issue is not listed in the CISA KEV catalog. However, the attack requires direct Layer 2 adjacency and the potential to disrupt all traffic on the device makes it a significant risk for affected networks. Exploitation would require the attacker to transmit crafted Ethernet frames; once activated, manual intervention to stop the traffic and flap interfaces is necessary to restore normal operation.
OpenCVE Enrichment