Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-20074: Improper Validation of Specified Type of Input in Cisco Cisco IOS XR Software

0
High
VulnerabilityCVE-2026-20074cvecve-2026-20074
Published: Wed Mar 11 2026 (03/11/2026, 16:31:14 UTC)
Source: CVE Database V5
Vendor/Project: Cisco
Product: Cisco IOS XR Software

Description

A vulnerability in the Intermediate System-to-Intermediate System (IS-IS) multi-instance routing feature of Cisco IOS XR Software could allow an unauthenticated, adjacent attacker to cause the IS-IS process to restart unexpectedly. This vulnerability is due to insufficient input validation of ingress IS-IS packets. An attacker could exploit this vulnerability by sending crafted IS-IS packets to an affected device after forming an adjacency. A successful exploit could allow the attacker to cause the IS-IS process to restart unexpectedly, resulting in a temporary loss of connectivity to advertised networks and a denial of service (DoS) condition. Note: The IS-IS protocol is a routing protocol. To exploit this vulnerability, an attacker must be Layer 2-adjacent to the affected device and must have formed an adjacency.  

AI-Powered Analysis

AILast updated: 03/11/2026, 17:14:24 UTC

Technical Analysis

CVE-2026-20074 is a vulnerability identified in the Intermediate System-to-Intermediate System (IS-IS) multi-instance routing feature of Cisco IOS XR Software. The root cause is insufficient validation of the type of input received in IS-IS packets. Specifically, when an attacker who is adjacent at Layer 2 and has successfully formed an IS-IS adjacency sends crafted IS-IS packets, the vulnerable device's IS-IS process can crash and restart unexpectedly. This restart disrupts the routing protocol operation, causing temporary loss of connectivity to networks advertised via IS-IS, effectively resulting in a denial of service (DoS). The vulnerability affects a broad range of Cisco IOS XR versions, including 7.8.x, 7.9.x, 7.10.x, 7.11.x, and 24.x series, which are commonly deployed in service provider and enterprise core networks. The CVSS v3.1 score is 7.4 (high severity), reflecting the ease of exploitation (no privileges or user interaction required) but limited attack vector (adjacent attacker with adjacency). The scope is changed (S:C) because the impact affects the IS-IS process and potentially other network functions relying on it. No known exploits have been reported in the wild, but the vulnerability poses a risk to network stability and availability. The IS-IS protocol is critical for routing in many large-scale networks, so disruption can have cascading effects on network performance and reliability.

Potential Impact

The primary impact of this vulnerability is a denial of service condition caused by the unexpected restart of the IS-IS routing process on affected Cisco IOS XR devices. This leads to temporary loss of routing information and connectivity to networks advertised via IS-IS, potentially causing network outages or degraded performance. For organizations relying on IS-IS for core or edge routing, this can disrupt critical communications, impacting business operations, service delivery, and customer experience. Service providers and large enterprises using Cisco IOS XR in their backbone or data center networks are particularly at risk. The requirement for Layer 2 adjacency and adjacency formation limits the attack surface to local network segments, but insider threats or compromised devices within the same broadcast domain could exploit this vulnerability. The disruption could also affect network redundancy and failover mechanisms, increasing the risk of prolonged outages. Although no known exploits are currently active in the wild, the vulnerability's high severity and broad affected versions warrant immediate attention to prevent potential exploitation.

Mitigation Recommendations

To mitigate CVE-2026-20074, organizations should prioritize upgrading affected Cisco IOS XR devices to patched versions provided by Cisco as soon as they become available. Until patches are applied, network administrators should implement strict Layer 2 segmentation and access controls to limit adjacency formation to trusted devices only. Employing features such as port security, dynamic ARP inspection, and DHCP snooping can reduce the risk of unauthorized devices forming adjacencies. Monitoring IS-IS adjacency states and process stability can help detect anomalous behavior indicative of exploitation attempts. Additionally, consider deploying network intrusion detection systems (NIDS) capable of inspecting IS-IS traffic for malformed packets. Network operators should review and harden IS-IS configurations to minimize exposure, including disabling unused IS-IS instances or interfaces where possible. Coordination with Cisco support for guidance on interim workarounds and best practices is recommended. Finally, maintain updated incident response plans to quickly address potential DoS events impacting routing infrastructure.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
cisco
Date Reserved
2025-10-08T11:59:15.362Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b19f882f860ef9434a76bd

Added to database: 3/11/2026, 4:59:52 PM

Last enriched: 3/11/2026, 5:14:24 PM

Last updated: 3/13/2026, 11:20:57 PM

Views: 37

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses