Description
A vulnerability in the connection-handling mechanism of Cisco Crosswork Network Controller (CNC) and Cisco Network Services Orchestrator (NSO) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected system.

This vulnerability is due to an inadequate implementation of rate-limiting on incoming network connections. An attacker could exploit this vulnerability by sending a large number of connection requests to an affected system. A successful exploit could allow the attacker to exhaust available connection resources, causing Cisco CNC and Cisco NSO to become unresponsive and resulting in a DoS condition for legitimate users and dependent services. A manual reboot of the system is required to recover from this condition.
Published: 2026-05-06
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A flaw in the connection‑handling mechanism of Cisco Crosswork Network Controller and Cisco Network Services Orchestrator allows an attacker who does not need to be authenticated to flood the system with a large number of connection requests. The inadequate rate limiting causes the service to consume all available connection resources, rendering the controller or orchestrator unresponsive. The resulting denial of service requires a manual reboot to restore normal operation. This vulnerability directly affects the availability of the affected services.

Affected Systems

Cisco Crosswork Network Change Automation and Cisco Network Services Orchestrator are impacted. Specific version information is not supplied in the advisory.

Risk and Exploitability

The CVSS score of 7.5 indicates a high severity potential. EPSS data is not available, so the current probability of exploitation cannot be quantified from this advisory. The vulnerability is not listed in CISA's KEV catalog. Because the attack requires only unauthenticated remote access and relies on sending many connections, an attacker with network reach to the affected system can exploit it using readily available tools, and escalation of privileges is not required.

Generated by OpenCVE AI on May 6, 2026 at 17:23 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply any Cisco Crosswork Network Change Automation or Cisco Network Services Orchestrator patch that addresses the rate‑limiting issue as soon as it becomes available.
  • If a patch is not yet available, enforce network‑level rate limiting or firewall rules to restrict the number of inbound connection attempts to the affected services.
  • Continuously monitor system logs for excessive connection attempts and investigate anomalous traffic patterns to identify attempted exploitation.

Generated by OpenCVE AI on May 6, 2026 at 17:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 06 May 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 06 May 2026 16:45:00 +0000

Type Values Removed Values Added
Description A vulnerability in the connection-handling mechanism of Cisco Crosswork Network Controller (CNC) and Cisco Network Services Orchestrator (NSO) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected system. This vulnerability is due to an inadequate implementation of rate-limiting on incoming network connections. An attacker could exploit this vulnerability by sending a large number of connection requests to an affected system. A successful exploit could allow the attacker to exhaust available connection resources, causing Cisco CNC and Cisco NSO to become unresponsive and resulting in a DoS condition for legitimate users and dependent services. A manual reboot of the system is required to recover from this condition.
Title Cisco Crosswork Network Controller and Cisco Network Services Orchestrator Connection Exhaustion Denial of Service Vulnerability
Weaknesses CWE-400
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2026-05-06T17:48:12.690Z

Reserved: 2025-10-08T11:59:15.394Z

Link: CVE-2026-20188

cve-icon Vulnrichment

Updated: 2026-05-06T17:46:39.036Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-06T17:16:21.190

Modified: 2026-05-06T18:59:53.230

Link: CVE-2026-20188

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-06T17:30:08Z

Weaknesses