Description
A vulnerability in the Border Gateway Protocol (BGP) enforce-first-as feature of Cisco Nexus 3000 Series Switches and Cisco Nexus 9000 Series Switches in standalone NX-OS mode could allow an unauthenticated, remote attacker to trigger BGP peer flaps, resulting in a denial of service (DoS) condition.

This vulnerability is due to incorrect parsing of a transitive BGP attribute. An attacker could exploit this vulnerability by sending a crafted BGP update through an established BGP peer session. If the update propagates to an affected device, it could cause the device to drop the BGP session and flap with the BGP peer that is forwarding this update, resulting in a DoS condition.
Published: 2026-05-20
Score: 6.8 Medium
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A flaw in Cisco Nexus 3000 and 9000 Series switches that use the enforce‑first‑as feature in NX‑OS can be triggered by an unauthenticated, remote attacker in order to cause BGP peer flaps. The vulnerability is caused by incorrect parsing of a transitive BGP attribute; a crafted BGP update received over an established BGP peer session can lead the device to drop the session and repeatedly flap with the peer, denying availability of the switch for BGP routing traffic. The impact is limited to a denial of service on the affected device, not to disclosure of data or remote code execution. The weakness corresponds to CWE‑670, a flaw in protocol parsing.

Affected Systems

Affected are Cisco Nexus 3000 Series Switches and Cisco Nexus 9000 Series Switches that run NX‑OS in standalone mode and have the enforce‑first‑as feature enabled. No specific firmware versions are listed in the advisory, so all current versions that support this feature are potentially impacted.

Risk and Exploitability

The CVSS score of 6.8 indicates a medium severity. No EPSS score is available, so the current exploitation probability is unknown, but the vulnerability is already public and documented by Cisco. It is not present in the CISA KEV catalog yet. Externally, an attacker could send a crafted BGP update over an existing BGP peering session and trigger the DoS. No privileged access is required and the threat can be delivered over the network between BGP peers.

Generated by OpenCVE AI on May 20, 2026 at 17:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the Cisco NX‑OS firmware update that addresses the enforce‑first‑as parsing flaw.
  • If the patch is not yet available, disable or turn off the enforce‑first‑as feature on affected switches until a fix is applied.
  • Monitor BGP session stability and proactively purge or reset flapping sessions if this behavior is observed.

Generated by OpenCVE AI on May 20, 2026 at 17:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 20 May 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 20 May 2026 16:45:00 +0000

Type Values Removed Values Added
Description A vulnerability in the Border Gateway Protocol (BGP) enforce-first-as feature of Cisco Nexus 3000 Series Switches and Cisco Nexus 9000 Series Switches in standalone NX-OS mode could allow an unauthenticated, remote attacker to trigger BGP peer flaps, resulting in a denial of service (DoS) condition. This vulnerability is due to incorrect parsing of a transitive BGP attribute. An attacker could exploit this vulnerability by sending a crafted BGP update through an established BGP peer session. If the update propagates to an affected device, it could cause the device to drop the BGP session and flap with the BGP peer that is forwarding this update, resulting in a DoS condition.
Title Cisco Nexus 3000 and 9000 Series Border Gateway Protocol Denial of Service Vulnerability
Weaknesses CWE-670
References
Metrics cvssV3_1

{'score': 6.8, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2026-05-20T18:31:44.204Z

Reserved: 2025-10-08T11:59:15.391Z

Link: CVE-2026-20171

cve-icon Vulnrichment

Updated: 2026-05-20T18:31:40.918Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-20T17:16:19.813

Modified: 2026-05-20T17:30:40.450

Link: CVE-2026-20171

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-20T17:30:35Z

Weaknesses