
[CIVN-2026-0106] SNMP Denial of Service Vulnerability in CISCO
—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
SNMP Denial of Service Vulnerability in CISCO
Indian – Computer Emergency Response Team (https://www.cert-in.org.in)
Severity Rating: HIGH
Systems Affected
Cisco Nexus 9000 Series Fabric Switches in ACI mode
Overview
A vulnerability has been reported Simple Network Management Protocol (SNMP) subsystem of Cisco Nexus 9000 Series Fabric Switches in ACI mode could allow an authenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.
Target Audience:
All IT administrators and individuals responsible for maintaining and updating in Software.
Risk Assessment:
High risk of data manipulation and service disruption.
Impact Assessment:
Potential impact on confidentiality, integrity, and availability of the system.
Description
This vulnerability exists due to improper processing when parsing SNMP requests. An attacker could exploit this vulnerability by continuously sending SNMP queries to a specific MIB of an affected device.
Successful exploitation of this vulnerability could allow the attacker to cause a kernel panic on the device, resulting in a reload and a DoS condition.
Note: This vulnerability affects SNMP versions 1, 2c, and 3. To exploit this vulnerability through SNMPv1 or SNMPv2c, the attacker must have a valid read-only SNMP community string for the affected system. To exploit this vulnerability through SNMPv3, the attacker must have valid SNMP user credentials for the affected system.
Solution
Apply appropriate updates as mentioned in Cisco Advisory
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-dsnmp-cNN39Uh
Vendor Information
CISCO
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-dsnmp-cNN39Uh
References
CISCO
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-dsnmp-cNN39Uh
CVE Name
CVE-2026-20048
– —
Thanks and Regards,
CERT-In
Incident Response Help Desk
e-mail: incident@cert-in.org.in
Phone: +91-11-22902657
Toll Free Number: 1800-11-4949
Toll Free Fax : 1800-11-6969
Web: http://www.cert-in.org.in
PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4
PGP Key information:
https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS
Postal address:
Indian Computer Emergency Response Team (CERT-In)
Ministry of Electronics and Information Technology
Government of India
Electronics Niketan
6, C.G.O. Complex
New Delhi-110 003
—–BEGIN PGP SIGNATURE—–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=sBCv
—–END PGP SIGNATURE—–


