[CIVN-2026-0107] Denial of Service Vulnerability in CISCO

By Published On: February 27, 2026

—–BEGIN PGP SIGNED MESSAGE—–

Hash: SHA256


Denial of Service Vulnerability in CISCO


Indian – Computer Emergency Response Team (https://www.cert-in.org.in)


Severity Rating: HIGH


Systems Affected


Cisco Nexus 9000 Series Fabric Switches in ACI mode

Overview


A vulnerability has been reported in Cisco Nexus 9000 Series Fabric Switches in ACI mode could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device.


Target Audience: 

All IT administrators and individuals responsible for maintaining and updating in Software.


Risk Assessment:

High risk of data manipulation and service disruption.


Impact Assessment:

Potential impact on confidentiality, integrity, and availability of the system.


Description


This vulnerability exists due to insufficient validation when processing specific Ethernet frames. An attacker could exploit this vulnerability by sending a crafted Ethernet frame to the management interface of an affected device.

Successful exploitation of this vulnerability could allow the attacker to cause the device to reload unexpectedly, resulting in a DoS condition.


Note: Only the out-of-band (OOB) management interface is affected.


Solution


Apply appropriate updates as mentioned in Cisco Advisory

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-cpdos-qLsv6pFD



Vendor Information


CISCO

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-cpdos-qLsv6pFD


References


CISCO

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-cpdos-qLsv6pFD


CVE Name

CVE-2026-20033


 



– —


Thanks and Regards,

CERT-In


Incident Response Help Desk

e-mail: incident@cert-in.org.in

Phone: +91-11-22902657

Toll Free Number: 1800-11-4949

Toll Free Fax : 1800-11-6969

Web: http://www.cert-in.org.in

PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4

PGP Key information:

https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS


Postal address:

Indian Computer Emergency Response Team (CERT-In)

Ministry of Electronics and Information Technology

Government of India

Electronics Niketan

6, C.G.O. Complex

New Delhi-110 003

—–BEGIN PGP SIGNATURE—–


iQIzBAEBCAAdFiEE6r4Iam/Ey0c/KakL3jCgcSdcys8FAmmhqqEACgkQ3jCgcSdc

ys8Z8w//XYZ10rcETaD7pl9CUErNKV74y3mV0B8E3u2aTrc+QX0qUMZ0uIqK+qWa

h73tVQLWezNDWdiOzYKnD7oVU9WQkt8u0qmWerc8i7f0Dr8jwvmgZe4Dk7LwvrS/

laNpBcj9xh6hy391hQAvDyxTnfWlNd6VXb8k/8L58/2BmQEPRJwZ2/yJLn3pcwLK

Kc6FiGcPGbodnA1Vi+25UfpVOMR2XJ3w/VToRoJa0Td6pUL5wa6vat5eX8VW5NJ1

mFjHWjqfiM3gixwoEdYnzPNd41vSmF7BqtP6G5Q1001f6h52OtQ6vjV+Hxjsgvg+

RW51ZoZEJvH1p0AonKHV4jQ7V5MqI+ZtsS8vfJzIyvjdG9ax6mYmz3m/udDSYeVA

nkMGrXF0A8PaiIXtzUtYfgKd9sQss4mpDiCWJtY/v+B71w0dq4USaFPX/mbJUHD3

dr930zrNSqRUPUuYIBf7XSnQiPl0S/P1CiSjHn4E0M9W1ORL17KQou4Dz8vJXKG3

cXjL99Y+sKZNfuSmpxA2CaxKP6G3lyxXv2UKOjOK2ZczKnZYUl/PLz72yHIAnJGF

JjOD3EABBLhTyuS4ShFxf+wORO9mUODb39DYyAsIgq+Tbvl/UHfF598eowE9dfIo

RHTPMtndYgc+9S6odsuXYRzDQ5+akzMILALJ+ZgDLnOtTxW2EdY=

=Ssgl

—–END PGP SIGNATURE—–

Share this article