
[CIVN-2026-0134] Denial of Service Vulnerability in CISCO
—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
Denial of Service Vulnerability in CISCO
Indian – Computer Emergency Response Team (https://www.cert-in.org.in)
Severity Rating: HIGH
Systems Affected
Cisco IOS XR Software
NCS 5700 Series line cards with the following products IDs (PIDs):
NC57-18DD-S
NC57-24DD
NC57-36H-SE
NC57-36H6D-S
NC57-MOD-S
NCS 5700 Series Fixed Chassis with the following PIDs:
NCS-57B1-5D24H-SE
NCS-57B1-5DSE-SYS
NCS-57B1-6D24-SYS
NCS-57B1-6D24H-S
Overview
A vulnerability has been reported in handling of an Egress Packet Network Interface (EPNI) Aligner interrupt in Cisco IOS XR Software for Cisco Network Convergence System (NCS) 5500 Series with NC57 line cards and Cisco NCS 5700 Routers and Cisco IOS XR Software for Third Party Software could allow an unauthenticated, remote attacker to cause the network processing unit (NPU) and ASIC to stop processing, preventing traffic from traversing the interface.
Target Audience:
All IT administrators and individuals responsible for maintaining and updating in Software.
Risk Assessment:
High risk of data manipulation and service disruption.
Impact Assessment:
Potential impact on confidentiality, integrity, and availability of the system.
Description
This vulnerability exists due to corruption of packets in specific cases when an EPNI Aligner interrupt is triggered while an affected device is experiencing heavy transit traffic. An attacker could exploit this vulnerability by sending a continuous flow of crafted packets to an interface of the affected device.
Successful exploitation of this vulnerability could allow the attacker to cause persistent, heavy packet loss, resulting in a denial of service (DoS) condition.
Solution
Apply appropriate updates as mentioned in Cisco Advisory
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-xrncs-epni-int-dos-TWMffUsN
Vendor Information
CISCO
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-xrncs-epni-int-dos-TWMffUsN
References
CISCO
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-xrncs-epni-int-dos-TWMffUsN
CVE Name
CVE-2026-20118
– —
Thanks and Regards,
CERT-In
Incident Response Help Desk
e-mail: incident@cert-in.org.in
Phone: +91-11-22902657
Toll Free Number: 1800-11-4949
Toll Free Fax : 1800-11-6969
Web: http://www.cert-in.org.in
PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4
PGP Key information:
https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS
Postal address:
Indian Computer Emergency Response Team (CERT-In)
Ministry of Electronics and Information Technology
Government of India
Electronics Niketan
6, C.G.O. Complex
New Delhi-110 003
—–BEGIN PGP SIGNATURE—–
iQIzBAEBCAAdFiEE6r4Iam/Ey0c/KakL3jCgcSdcys8FAmmy1C8ACgkQ3jCgcSdc
ys/YVw/+Iz40c3Lciyjyg+U/sSlnzZ2t+OTtAFcB3pkKJioJHf8IwPQirfA/EWe5
5tQOyNka1z1IZdPV31HjrgCHnjMGa+DOurYL+fh3KM+vcdrNaoqLew4nD4jms0QI
ZNkrFOSMGLwihkgfw85ueQzebj3EuKISv9lVD+xNU2VUYqdvielGcn0RqLqW+ytZ
0IGCLgQohAm5/BcKLUEs9ENZe27xFRiPd8+rMLZd04arnuaiIOZ2LLu4NxpK9cbg
+9dzaPOnwaWOduYMd6Hs3RlfnaCQ8YDryl1wqblC91SXsO4ETTc0F8BWHxgtbANw
r4JC8tVViT23XB8ohjyZlE5EJuX+nf4w5XDlolaecXyrblu6T4N3ME/pTWXF0A5H
eNTGCgjqfhoM9x8KxRrcpI/k7U97HTBqi8fLpS42kmCT8yUdwB6W1k0DcpnF3nK8
PR5rs0vULIzodEuZnmsuMnl6+nEQ6psPr4gVvqg51V687mYl6QhJsJM7Uzg1sxsY
wTq2QX4zOeHJaVsyW8+x0Ar7G/9VPh9lMVTTe0fPUXNVVUViEZd3spEeshjfrRQB
VbC6SERIbFa6zyA5i4WgssnqRUedPmda+X85EhV+jGlUMCU6wb9iWxE1zAPXEPf4
eQXszWgk00d3CmfVzysR97wKxjZXRbNAiBg5qXu7s+u6lmd2lK4=
=D3wI
—–END PGP SIGNATURE—–


