CVE-2026-20051: Use of Uninitialized Variable in Cisco Cisco NX-OS Software
A vulnerability with the Ethernet VPN (EVPN) Layer 2 ingress packet processing of Cisco Nexus 3600 Platform Switches and Cisco Nexus 9500-R Series Switching Platforms could allow an unauthenticated, adjacent attacker to trigger a Layer 2 traffic loop. This vulnerability is due to a logic error when processing a crafted Layer 2 ingress frame. An attacker could exploit this vulnerability by sending a stream of crafted Ethernet frames through the targeted device. A successful exploit could allow the attacker to cause a Layer 2 Virtual eXtensible LAN (VxLAN) traffic loop, which, in turn, could result in a denial of service (DoS) condition. This Layer 2 loop could oversubscribe the bandwidth on network interfaces, which would result in all data plane traffic being dropped. To exploit this vulnerability, the attacker must be Layer 2-adjacent to the affected device. Note: To stop active exploitation of this vulnerability, manual intervention is required to both stop the crafted traffic and flap all involved network interfaces. For additional assistance if a Layer 2 loop that is related to this vulnerability is suspected, contact the Cisco Technical Assistance Center (TAC) or the proper support provider.
AI Analysis
Technical Summary
CVE-2026-20051 is a vulnerability identified in the Ethernet VPN (EVPN) Layer 2 ingress packet processing of Cisco NX-OS software running on Cisco Nexus 3600 Platform Switches and Cisco Nexus 9500-R Series Switching Platforms. The root cause is a logic error triggered by processing specially crafted Layer 2 ingress Ethernet frames. An unauthenticated attacker with Layer 2 adjacency can exploit this flaw by sending a stream of malicious Ethernet frames to the targeted device. This causes the device to enter a Layer 2 Virtual eXtensible LAN (VxLAN) traffic loop, which oversubscribes the bandwidth on network interfaces. The resulting traffic loop leads to a denial of service (DoS) condition by dropping all data plane traffic, effectively disrupting network communications. The vulnerability affects a wide range of NX-OS versions from 9.2(1) through 10.6(1s) and related builds. Exploitation does not require authentication or user interaction but does require physical or logical Layer 2 adjacency to the vulnerable device. Recovery from an active exploit requires manual intervention to stop the crafted traffic and flap the affected interfaces. Cisco recommends contacting their Technical Assistance Center (TAC) for support if a related Layer 2 loop is suspected. No public exploits or active exploitation have been reported to date. The CVSS v3.1 base score is 7.4, reflecting high severity due to the potential for network-wide denial of service and the complexity of the attack vector.
Potential Impact
The primary impact of CVE-2026-20051 is a denial of service condition on critical network infrastructure devices, specifically Cisco Nexus 3600 and 9500-R series switches. By triggering a Layer 2 VxLAN traffic loop, an attacker can cause oversubscription of bandwidth on network interfaces, resulting in dropped data plane traffic and network outages. This can severely disrupt enterprise and data center network operations, impacting availability of services dependent on these switches. The vulnerability affects a broad range of NX-OS versions, increasing the scope of potentially impacted devices globally. Organizations relying on these Cisco platforms for core switching and EVPN services face risks of network instability, degraded performance, and potential downtime. Since exploitation requires Layer 2 adjacency, attackers with access to the local network segment or compromised devices within the same broadcast domain pose a significant threat. The lack of authentication requirement lowers the barrier for exploitation once adjacency is achieved. Although no known exploits are reported, the potential for widespread network disruption makes this vulnerability a critical concern for network administrators and security teams.
Mitigation Recommendations
To mitigate CVE-2026-20051, organizations should first identify all Cisco Nexus 3600 and 9500-R series switches running affected NX-OS versions. Immediate steps include: 1) Applying Cisco-released patches or software updates that address this vulnerability as soon as they become available; 2) Implementing strict network segmentation and access controls to limit Layer 2 adjacency to trusted devices only, reducing the attack surface; 3) Monitoring network traffic for signs of abnormal Layer 2 loops or unusual VxLAN traffic patterns using advanced network monitoring and anomaly detection tools; 4) Preparing incident response procedures to quickly flap affected interfaces and stop malicious traffic if a loop is detected; 5) Engaging Cisco Technical Assistance Center (TAC) for guidance and support in case of suspected exploitation; 6) Reviewing and hardening EVPN and VxLAN configurations to ensure they follow best practices and minimize exposure; 7) Employing network access control (NAC) solutions to prevent unauthorized devices from connecting at Layer 2; 8) Conducting regular network audits to identify and remediate misconfigurations that could facilitate exploitation. These targeted measures go beyond generic advice by focusing on limiting adjacency, proactive detection, and rapid response to traffic loops.
Affected Countries
United States, Canada, United Kingdom, Germany, France, Japan, Australia, India, Brazil, South Korea, Singapore, Netherlands, United Arab Emirates, China, Israel
CVE-2026-20051: Use of Uninitialized Variable in Cisco Cisco NX-OS Software
Description
A vulnerability with the Ethernet VPN (EVPN) Layer 2 ingress packet processing of Cisco Nexus 3600 Platform Switches and Cisco Nexus 9500-R Series Switching Platforms could allow an unauthenticated, adjacent attacker to trigger a Layer 2 traffic loop. This vulnerability is due to a logic error when processing a crafted Layer 2 ingress frame. An attacker could exploit this vulnerability by sending a stream of crafted Ethernet frames through the targeted device. A successful exploit could allow the attacker to cause a Layer 2 Virtual eXtensible LAN (VxLAN) traffic loop, which, in turn, could result in a denial of service (DoS) condition. This Layer 2 loop could oversubscribe the bandwidth on network interfaces, which would result in all data plane traffic being dropped. To exploit this vulnerability, the attacker must be Layer 2-adjacent to the affected device. Note: To stop active exploitation of this vulnerability, manual intervention is required to both stop the crafted traffic and flap all involved network interfaces. For additional assistance if a Layer 2 loop that is related to this vulnerability is suspected, contact the Cisco Technical Assistance Center (TAC) or the proper support provider.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-20051 is a vulnerability identified in the Ethernet VPN (EVPN) Layer 2 ingress packet processing of Cisco NX-OS software running on Cisco Nexus 3600 Platform Switches and Cisco Nexus 9500-R Series Switching Platforms. The root cause is a logic error triggered by processing specially crafted Layer 2 ingress Ethernet frames. An unauthenticated attacker with Layer 2 adjacency can exploit this flaw by sending a stream of malicious Ethernet frames to the targeted device. This causes the device to enter a Layer 2 Virtual eXtensible LAN (VxLAN) traffic loop, which oversubscribes the bandwidth on network interfaces. The resulting traffic loop leads to a denial of service (DoS) condition by dropping all data plane traffic, effectively disrupting network communications. The vulnerability affects a wide range of NX-OS versions from 9.2(1) through 10.6(1s) and related builds. Exploitation does not require authentication or user interaction but does require physical or logical Layer 2 adjacency to the vulnerable device. Recovery from an active exploit requires manual intervention to stop the crafted traffic and flap the affected interfaces. Cisco recommends contacting their Technical Assistance Center (TAC) for support if a related Layer 2 loop is suspected. No public exploits or active exploitation have been reported to date. The CVSS v3.1 base score is 7.4, reflecting high severity due to the potential for network-wide denial of service and the complexity of the attack vector.
Potential Impact
The primary impact of CVE-2026-20051 is a denial of service condition on critical network infrastructure devices, specifically Cisco Nexus 3600 and 9500-R series switches. By triggering a Layer 2 VxLAN traffic loop, an attacker can cause oversubscription of bandwidth on network interfaces, resulting in dropped data plane traffic and network outages. This can severely disrupt enterprise and data center network operations, impacting availability of services dependent on these switches. The vulnerability affects a broad range of NX-OS versions, increasing the scope of potentially impacted devices globally. Organizations relying on these Cisco platforms for core switching and EVPN services face risks of network instability, degraded performance, and potential downtime. Since exploitation requires Layer 2 adjacency, attackers with access to the local network segment or compromised devices within the same broadcast domain pose a significant threat. The lack of authentication requirement lowers the barrier for exploitation once adjacency is achieved. Although no known exploits are reported, the potential for widespread network disruption makes this vulnerability a critical concern for network administrators and security teams.
Mitigation Recommendations
To mitigate CVE-2026-20051, organizations should first identify all Cisco Nexus 3600 and 9500-R series switches running affected NX-OS versions. Immediate steps include: 1) Applying Cisco-released patches or software updates that address this vulnerability as soon as they become available; 2) Implementing strict network segmentation and access controls to limit Layer 2 adjacency to trusted devices only, reducing the attack surface; 3) Monitoring network traffic for signs of abnormal Layer 2 loops or unusual VxLAN traffic patterns using advanced network monitoring and anomaly detection tools; 4) Preparing incident response procedures to quickly flap affected interfaces and stop malicious traffic if a loop is detected; 5) Engaging Cisco Technical Assistance Center (TAC) for guidance and support in case of suspected exploitation; 6) Reviewing and hardening EVPN and VxLAN configurations to ensure they follow best practices and minimize exposure; 7) Employing network access control (NAC) solutions to prevent unauthorized devices from connecting at Layer 2; 8) Conducting regular network audits to identify and remediate misconfigurations that could facilitate exploitation. These targeted measures go beyond generic advice by focusing on limiting adjacency, proactive detection, and rapid response to traffic loops.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- cisco
- Date Reserved
- 2025-10-08T11:59:15.355Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6b6eb7ef31ef0b55563d
Added to database: 2/25/2026, 9:36:46 PM
Last enriched: 2/26/2026, 12:02:36 AM
Last updated: 4/12/2026, 11:13:03 AM
Views: 90
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.