Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-20051: Use of Uninitialized Variable in Cisco Cisco NX-OS Software

0
High
VulnerabilityCVE-2026-20051cvecve-2026-20051
Published: Wed Feb 25 2026 (02/25/2026, 16:14:33 UTC)
Source: CVE Database V5
Vendor/Project: Cisco
Product: Cisco NX-OS Software

Description

CVE-2026-20051 is a high-severity vulnerability in Cisco NX-OS software affecting Cisco Nexus 3600 and 9500-R series switches. It arises from a logic error in Ethernet VPN (EVPN) Layer 2 ingress packet processing, allowing an unauthenticated, Layer 2-adjacent attacker to send crafted Ethernet frames that trigger a Layer 2 VxLAN traffic loop. This loop can oversubscribe network interface bandwidth, causing a denial of service by dropping all data plane traffic. Exploitation requires adjacency at Layer 2 but no authentication or user interaction. Manual intervention is necessary to stop the loop and restore network interfaces. No known exploits are currently reported in the wild. The vulnerability impacts a broad range of NX-OS versions from 9. 2 through 10. 6. Organizations using affected Cisco Nexus platforms should prioritize mitigation to prevent potential network outages.

AI-Powered Analysis

AILast updated: 02/26/2026, 00:02:36 UTC

Technical Analysis

CVE-2026-20051 is a vulnerability identified in the Ethernet VPN (EVPN) Layer 2 ingress packet processing of Cisco NX-OS software running on Cisco Nexus 3600 Platform Switches and Cisco Nexus 9500-R Series Switching Platforms. The root cause is a logic error triggered by processing specially crafted Layer 2 ingress Ethernet frames. An unauthenticated attacker with Layer 2 adjacency can exploit this flaw by sending a stream of malicious Ethernet frames to the targeted device. This causes the device to enter a Layer 2 Virtual eXtensible LAN (VxLAN) traffic loop, which oversubscribes the bandwidth on network interfaces. The resulting traffic loop leads to a denial of service (DoS) condition by dropping all data plane traffic, effectively disrupting network communications. The vulnerability affects a wide range of NX-OS versions from 9.2(1) through 10.6(1s) and related builds. Exploitation does not require authentication or user interaction but does require physical or logical Layer 2 adjacency to the vulnerable device. Recovery from an active exploit requires manual intervention to stop the crafted traffic and flap the affected interfaces. Cisco recommends contacting their Technical Assistance Center (TAC) for support if a related Layer 2 loop is suspected. No public exploits or active exploitation have been reported to date. The CVSS v3.1 base score is 7.4, reflecting high severity due to the potential for network-wide denial of service and the complexity of the attack vector.

Potential Impact

The primary impact of CVE-2026-20051 is a denial of service condition on critical network infrastructure devices, specifically Cisco Nexus 3600 and 9500-R series switches. By triggering a Layer 2 VxLAN traffic loop, an attacker can cause oversubscription of bandwidth on network interfaces, resulting in dropped data plane traffic and network outages. This can severely disrupt enterprise and data center network operations, impacting availability of services dependent on these switches. The vulnerability affects a broad range of NX-OS versions, increasing the scope of potentially impacted devices globally. Organizations relying on these Cisco platforms for core switching and EVPN services face risks of network instability, degraded performance, and potential downtime. Since exploitation requires Layer 2 adjacency, attackers with access to the local network segment or compromised devices within the same broadcast domain pose a significant threat. The lack of authentication requirement lowers the barrier for exploitation once adjacency is achieved. Although no known exploits are reported, the potential for widespread network disruption makes this vulnerability a critical concern for network administrators and security teams.

Mitigation Recommendations

To mitigate CVE-2026-20051, organizations should first identify all Cisco Nexus 3600 and 9500-R series switches running affected NX-OS versions. Immediate steps include: 1) Applying Cisco-released patches or software updates that address this vulnerability as soon as they become available; 2) Implementing strict network segmentation and access controls to limit Layer 2 adjacency to trusted devices only, reducing the attack surface; 3) Monitoring network traffic for signs of abnormal Layer 2 loops or unusual VxLAN traffic patterns using advanced network monitoring and anomaly detection tools; 4) Preparing incident response procedures to quickly flap affected interfaces and stop malicious traffic if a loop is detected; 5) Engaging Cisco Technical Assistance Center (TAC) for guidance and support in case of suspected exploitation; 6) Reviewing and hardening EVPN and VxLAN configurations to ensure they follow best practices and minimize exposure; 7) Employing network access control (NAC) solutions to prevent unauthorized devices from connecting at Layer 2; 8) Conducting regular network audits to identify and remediate misconfigurations that could facilitate exploitation. These targeted measures go beyond generic advice by focusing on limiting adjacency, proactive detection, and rapid response to traffic loops.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
cisco
Date Reserved
2025-10-08T11:59:15.355Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6b6eb7ef31ef0b55563d

Added to database: 2/25/2026, 9:36:46 PM

Last enriched: 2/26/2026, 12:02:36 AM

Last updated: 2/26/2026, 8:14:47 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats