[CIVN-2026-0230] Denial of Service Vulnerability in CISCO products

By Published On: May 14, 2026

—–BEGIN PGP SIGNED MESSAGE—–

Hash: SHA256


Denial of Service Vulnerability in CISCO products


Indian – Computer Emergency Response Team (https://www.cert-in.org.in)


Severity Rating: HIGH


Systems Affected


Cisco Crosswork Network Controller (CNC) version prior to 7.2

Cisco Network Services Orchestrator (NSO) versions prior to 6.5 and 6.4.1.3

Overview


A vulnerability has been reported in the connection-handling mechanism of Cisco Crosswork Network Controller (CNC) and Cisco Network Services Orchestrator (NSO) that could allow an unauthenticated remote attacker to cause a denial of service (DoS) condition on an affected system.


Target Audience:

All IT administrators and individuals responsible for maintaining and updating Cisco products.


Risk Assessment:

High risk of service disruption and network management instability.


Impact Assessment:

Potential impact on availability of the affected systems and dependent network services.


Description


Cisco Crosswork Network Controller (CNC) and Network Services Orchestrator (NSO) are components of Ciscos Crosswork network automation portfolio, often working together to provide comprehensive, closed-loop automation.


This vulnerability exists due to an inadequate implementation of rate-limiting on incoming network connections in Cisco CNC and Cisco NSO. An attacker could exploit this vulnerability by sending a large number of connection requests to the targeted system.


Successful exploitation of this vulnerability could allow an attacker to exhaust available connection resources, causing Cisco CNC and Cisco NSO to become unresponsive and resulting in a denial of service (DoS) condition for legitimate users.


Solution


Apply appropriate updates as mentioned in Cisco Advisory

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nso-dos-7Egqyc



Vendor Information


CISCO

https://www.cisco.com/site/us/en/products/index.html


References


CISCO

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nso-dos-7Egqyc


CVE Name

CVE-2026-20188




– —


Thanks and Regards,

CERT-In


Incident Response Help Desk

e-mail: incident@cert-in.org.in

Phone: +91-11-22902657

Toll Free Number: 1800-11-4949

Toll Free Fax : 1800-11-6969

Web: http://www.cert-in.org.in

PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4

PGP Key information:

https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS


Postal address:

Indian Computer Emergency Response Team (CERT-In)

Ministry of Electronics and Information Technology

Government of India

Electronics Niketan

6, C.G.O. Complex

New Delhi-110 003

—–BEGIN PGP SIGNATURE—–


iQIzBAEBCAAdFiEE6r4Iam/Ey0c/KakL3jCgcSdcys8FAmoF4poACgkQ3jCgcSdc

ys8Mig//QR+ZclfnbTfIgrKK3ztrlQ94d2SxQT9+bUxk+ouhJuqlRr/KuATAHWet

mrqC9K6y41vQu42Jy+ZreX7ZtjYUdJwTVqlpp5tEnwaZc10chUgF1dOSz/0hRYNu

Sl9KBbBh8psTcJ1Idsi6SgML6yZ/JzIM6ZqlS4YMBW0PEgVi1gdiHbD9X3OHAJqx

Rb7apx9gFdA6E7k0/ff6N4lmeEndvrpmLoomsjr8k59O5p18+z5iO3UxV9nWgm9M

608wUbK8atQa0tRg77DzJXttYXBIOPm5sR157jpDQVDRLJ+Z1VTZ2Cs29qyZjS7Y

STv1GqX+dI7nG8r8MCaIVGb22lNvXXD4dKMR9P6IX/4uKEP17Db1M836BjM1x1qc

rxv669UEm0sWi6pPaotjvVTMMWHt5EFtdcB9ejZXL8LmnU1X+2x6UxG7wTCUDxdw

Z1vyBy1JUH+gSjb1EImkJ0njOWEr10WzAPaWTJPn/HXbkR5cic3pmxMafKpzJjB+

NJfG1LWyDNroBfe/vNgUU4+69ciyr6r/Sc0roxeiHiqY8kneYFU7jN0XPTsJnfsh

f7RSlQbGoDq1344FEojXHe/LBLyIwv71wJot54JpwMVFlEhkMViJMAuXo4t6LpO9

fOSEZY+PM2/QKInPmJHUm4rVNmaRmsYye3YE/tmKe3ek0HKy7JU=

=yZXw

—–END PGP SIGNATURE—–

Share this article