Description
A vulnerability in the web-based management interface of Cisco IoT Field Network Director could allow an authenticated, remote attacker with low privileges to cause a DoS condition on a remotely managed router.

This vulnerability is due to improper error handling. An attacker could exploit this vulnerability by submitting crafted input to the web-based management interface. A successful exploit could allow the attacker to request unauthorized files from a remote router, causing the router to reload and resulting in a DoS condition.
Published: 2026-05-06
Score: 7.7 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A flaw in Cisco IoT Field Network Director’s web‑based management interface allows an authenticated attacker with low privileges to submit crafted input, which triggers improper error handling and forces the router to load an unauthorized file. This action causes the router to reload, resulting in a denial‑of‑service condition for the managed device. The vulnerability is a classic access‑control weakness (CWE‑284).

Affected Systems

Cisco IoT Field Network Director (IoT‑FND) is affected. Version information is not specified in the advisory.

Risk and Exploitability

The CVSS score of 7.7 indicates a high severity level. No EPSS score was published and the vulnerability is not listed in the CISA KEV catalog, suggesting limited exploitation data. The likely attack vector is remote via the web management interface, requiring an authenticated session with low‑privilege rights. Successful exploitation would render a target router unavailable by forcing it to reload, potentially disrupting network operations and service availability.

Generated by OpenCVE AI on May 6, 2026 at 17:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Cisco IoT Field Network Director to the latest firmware that addresses the access‑control flaw.
  • Restrict web‑based management access to trusted administrators by implementing strict role‑based access control.
  • Configure network perimeter security to limit exposure of the management interface to trusted IP ranges.
  • Monitor router logs and interface usage for abnormal reload events to detect potential exploitation attempts.

Generated by OpenCVE AI on May 6, 2026 at 17:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 06 May 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 06 May 2026 16:45:00 +0000

Type Values Removed Values Added
Description A vulnerability in the web-based management interface of Cisco IoT Field Network Director could allow an authenticated, remote attacker with low privileges to cause a DoS condition on a remotely managed router. This vulnerability is due to improper error handling. An attacker could exploit this vulnerability by submitting crafted input to the web-based management interface. A successful exploit could allow the attacker to request unauthorized files from a remote router, causing the router to reload and resulting in a DoS condition.
Title Cisco IoT Field Network Director Remote Device Denial of Service Vulnerability
Weaknesses CWE-284
References
Metrics cvssV3_1

{'score': 7.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2026-05-06T17:26:01.173Z

Reserved: 2025-10-08T11:59:15.390Z

Link: CVE-2026-20167

cve-icon Vulnrichment

Updated: 2026-05-06T17:25:54.850Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-06T17:16:20.433

Modified: 2026-05-06T18:59:53.230

Link: CVE-2026-20167

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-06T17:30:08Z

Weaknesses