Description
A vulnerability in the Secure Copy Protocol (SCP) server feature of Cisco IOS XE Software could allow an authenticated, local attacker with low privileges to cause a denial of service (DoS) condition on an affected device.

This vulnerability is due to improper handling of a malformed SCP request. An attacker could exploit this vulnerability by issuing a crafted command through SSH. A successful exploit could allow the attacker to cause the device to reload unexpectedly, resulting in a DoS condition.
Published: 2026-03-25
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service via malformed SCP request
Action: Apply Patch
AI Analysis

Impact

A malformed Secure Copy Protocol request can trigger a device reload on Cisco IOS XE systems. The weakness originates from improper input handling during SCP sessions, allowing an attacker with a low‑privilege local account to trigger a denial of service. Successful exploitation results in an unexpected reboot, bringing the device offline until it recovers, which can disrupt network services and operations.

Affected Systems

The affected product is Cisco IOS XE Software. No specific affected version range is listed in the advisory, so any device running IOS XE with the SCP server feature enabled may be vulnerable. The defect applies to authenticated local users possessing SSH access to the device.

Risk and Exploitability

The CVSS base score of 6.5 indicates a moderate severity, reflecting the local nature of the required access. EPSS data is not provided, and the vulnerability is not listed in the CISA KEV catalog, suggesting no known public exploitation. The attack vector is inferred to be a local SSH session where the attacker issues a crafted SCP command. Because the flaw arises from malformed input, exploitation does not require privileged or root access, only an available local account, making it an attractive target for attackers already inside the network.

Generated by OpenCVE AI on March 25, 2026 at 19:33 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Cisco IOS XE Software release that contains the SCP DoS fix
  • Disable the SCP server feature if it is not required in the environment
  • Restrict SSH access to the device to trusted users and lower privilege accounts
  • Ensure that local user accounts follow the principle of least privilege

Generated by OpenCVE AI on March 25, 2026 at 19:33 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 27 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 26 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Cisco
Cisco ios Xe Software
Vendors & Products Cisco
Cisco ios Xe Software

Wed, 25 Mar 2026 22:00:00 +0000

Type Values Removed Values Added
Title Authenticated DoS via Malformed SCP Request on Cisco IOS XE

Wed, 25 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Description A vulnerability in the Secure Copy Protocol (SCP) server feature of Cisco IOS XE Software could allow an authenticated, local attacker with low privileges to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper handling of a malformed SCP request. An attacker could exploit this vulnerability by issuing a crafted command through SSH. A successful exploit could allow the attacker to cause the device to reload unexpectedly, resulting in a DoS condition.
Weaknesses CWE-235
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H'}


Subscriptions

Cisco Ios Xe Software
cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2026-03-27T15:01:51.059Z

Reserved: 2025-10-08T11:59:15.366Z

Link: CVE-2026-20083

cve-icon Vulnrichment

Updated: 2026-03-27T15:01:47.482Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-25T16:16:12.903

Modified: 2026-03-26T15:13:33.940

Link: CVE-2026-20083

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-26T11:42:43Z

Weaknesses