7.4
CVE-2026-20033
- EPSS 0.02%
- Veröffentlicht 25.02.2026 16:26:29
- Zuletzt bearbeitet 27.02.2026 14:06:59
- Quelle psirt@cisco.com
- CVE-Watchlists
- Unerledigt
A vulnerability in Cisco Nexus 9000 Series Fabric Switches in ACI mode could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient validation when processing specific Ethernet frames. An attacker could exploit this vulnerability by sending a crafted Ethernet frame to the management interface of an affected device. A successful exploit could allow the attacker to cause the device to reload unexpectedly, resulting in a DoS condition. Note: Only the out-of-band (OOB) management interface is affected.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerCisco
≫
Produkt
Cisco NX-OS System Software in ACI Mode
Default Statusunknown
Version
15.2(1g)
Status
affected
Version
15.2(2e)
Status
affected
Version
15.2(2f)
Status
affected
Version
15.2(2g)
Status
affected
Version
15.2(2h)
Status
affected
Version
15.2(3f)
Status
affected
Version
15.2(3e)
Status
affected
Version
15.2(3g)
Status
affected
Version
15.2(4d)
Status
affected
Version
15.2(4e)
Status
affected
Version
15.2(5c)
Status
affected
Version
15.2(5d)
Status
affected
Version
16.0(1g)
Status
affected
Version
15.2(5e)
Status
affected
Version
15.2(4f)
Status
affected
Version
15.2(6e)
Status
affected
Version
15.2(6h)
Status
affected
Version
16.0(1j)
Status
affected
Version
15.2(6g)
Status
affected
Version
15.2(7f)
Status
affected
Version
15.2(7g)
Status
affected
Version
16.0(2h)
Status
affected
Version
15.2(8d)
Status
affected
Version
16.0(2j)
Status
affected
Version
15.2(8e)
Status
affected
Version
16.0(3d)
Status
affected
Version
16.0(3e)
Status
affected
Version
15.2(8f)
Status
affected
Version
15.2(8g)
Status
affected
Version
15.3(1d)
Status
affected
Version
15.2(8h)
Status
affected
Version
16.0(4c)
Status
affected
Version
15.3(2a)
Status
affected
Version
15.2(8i)
Status
affected
Version
16.0(5h)
Status
affected
Version
15.3(2b)
Status
affected
Version
16.0(3g)
Status
affected
Version
16.0(5j)
Status
affected
Version
15.3(2c)
Status
affected
Version
16.0(6c)
Status
affected
Version
15.3(2d)
Status
affected
Version
16.1(1f)
Status
affected
Version
16.0(7e)
Status
affected
Version
16.0(8e)
Status
affected
Version
15.3(2e)
Status
affected
Version
16.0(8f)
Status
affected
Version
16.1(2f)
Status
affected
Version
16.1(2g)
Status
affected
Version
15.3(2f)
Status
affected
Version
16.0(9c)
Status
affected
Version
16.1(3f)
Status
affected
Version
16.0(9d)
Status
affected
Version
16.0(6h)
Status
affected
Version
16.0(8h)
Status
affected
Version
16.1(3g)
Status
affected
Version
16.0(9e)
Status
affected
Version
16.1(4h)
Status
affected
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.02% | 0.045 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| psirt@cisco.com | 7.4 | 2.8 | 4 |
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
|
CWE-805 Buffer Access with Incorrect Length Value
The product uses a sequential operation to read or write a buffer, but it uses an incorrect length value that causes it to access memory that is outside of the bounds of the buffer.