Description
A vulnerability in the SSH service of Cisco IEC6400 Wireless Backhaul Edge Compute Software could allow an unauthenticated, remote attacker to cause the SSH service to stop responding.

This vulnerability exists because the SSH service lacks effective flood protection. An attacker could exploit this vulnerability by initiating a denial of service (DoS) attack against the SSH port. A successful exploit could allow the attacker to cause the SSH service to be unresponsive during the period of the DoS attack. All other operations remain stable during the attack.
Published: 2026-01-21
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote Denial of Service
Action: Apply Fix
AI Analysis

Impact

An attacker can exploit the SSH service on Cisco IEC6400 Wireless Backhaul Edge Compute Software by sending a flood of connection requests. Because the service lacks effective flood protection, the SSH daemon becomes unresponsive, resulting in a denial of service limited to SSH access. This vulnerability is categorized as CWE‑400 due to uncontrolled resource consumption. The effect is that remote users cannot authenticate via SSH but other device functions continue to operate normally.

Affected Systems

The affected product is the Cisco IEC6400 Wireless Backhaul Edge Compute Software, part of Cisco Ultra‑Reliable Wireless Backhaul. The vendor and product name are provided by Cisco’s CNA. No specific version information is listed in the advisory, so devices of any build that contains the exposed SSH daemon are potentially vulnerable until updated.

Risk and Exploitability

The CVSS base score is 5.3, indicating moderate severity, and the EPSS score is below 1%, suggesting a low likelihood of exploitation in the wild. The vulnerability is not currently listed in the CISA KEV catalog. Exploitation requires no special credentials; an unauthenticated attacker can initiate a DoS by repeatedly targeting the SSH port, causing the service to halt for the duration of the attack. As the rest of the system remains unaffected, the overall impact is a loss of remote management connectivity rather than broader system compromise.

Generated by OpenCVE AI on April 18, 2026 at 04:14 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Cisco IEC6400 firmware to the version that includes the SSH flood‑protection fix as detailed in the Cisco security advisory.
  • Configure network devices or firewall rules to limit the rate of incoming SSH connections from individual IP addresses, reducing the effectiveness of flood attempts.
  • Enable any device‑level SSH rate limiting or resource‑usage controls that are available in the software to mitigate potential service disruption.

Generated by OpenCVE AI on April 18, 2026 at 04:14 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 23 Jan 2026 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Cisco
Cisco iec6400 Wireless Backhaul Edge Compute
Vendors & Products Cisco
Cisco iec6400 Wireless Backhaul Edge Compute

Wed, 21 Jan 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 21 Jan 2026 16:45:00 +0000

Type Values Removed Values Added
Description A vulnerability in the SSH service of Cisco IEC6400 Wireless Backhaul Edge Compute Software could allow an unauthenticated, remote attacker to cause the SSH service to stop responding. This vulnerability exists because the SSH service lacks effective flood protection. An attacker could exploit this vulnerability by initiating a denial of service (DoS) attack against the SSH port. A successful exploit could allow the attacker to cause the SSH service to be unresponsive during the period of the DoS attack. All other operations remain stable during the attack.
Title Cisco IEC6400 Edge Compute Appliance SSH Denial of Service Vulnerability
Weaknesses CWE-400
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}


Subscriptions

Cisco Iec6400 Wireless Backhaul Edge Compute
cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2026-01-21T16:47:39.610Z

Reserved: 2025-10-08T11:59:15.363Z

Link: CVE-2026-20080

cve-icon Vulnrichment

Updated: 2026-01-21T16:47:32.237Z

cve-icon NVD

Status : Deferred

Published: 2026-01-21T17:16:08.410

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-20080

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T04:15:05Z

Weaknesses