๐Ÿ” CVE Alert

CVE-2026-20051

HIGH 7.4

Cisco Nexus 3600-R and 9500-R Series Switching Platforms Layer 2 Loop Denial of Service Vulnerability

CVSS Score
7.4
EPSS Score
0.0%
EPSS Percentile
0th

A vulnerability with the Ethernet VPN (EVPN) Layer 2 ingress packet processing of Cisco Nexus 3600 Platform Switches and Cisco Nexus 9500-R Series Switching Platforms could allow an unauthenticated, adjacent attacker to trigger a Layer 2 traffic loop. This vulnerability is due to a logic error when processing a crafted Layer 2 ingress frame. An attacker could exploit this vulnerability by sending a stream of crafted Ethernet frames through the targeted device. A successful exploit could allow the attacker to cause a Layer 2 Virtual eXtensible LAN (VxLAN) traffic loop, which, in turn, could result in a denial of service (DoS) condition. This Layer 2 loop could oversubscribe the bandwidth on network interfaces, which would result in all data plane traffic being dropped. To exploit this vulnerability, the attacker must be Layer 2-adjacent to the affected device. Note: To stop active exploitation of this vulnerability, manual intervention is required to both stop the crafted traffic and flap all involved network interfaces. For additional assistance if a Layer 2 loop that is related to this vulnerability is suspected, contact the Cisco Technical Assistance Center (TAC) or the proper support provider. 

CWE CWE-457
Vendor cisco
Product cisco nx-os software
Ecosystems
Industries
NetworkingTelecommunications
Published Feb 25, 2026
Last Updated Feb 25, 2026
Stay Ahead of the Next One

Get instant alerts for cisco cisco nx-os software

Be the first to know when new high vulnerabilities affecting cisco cisco nx-os software are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
Attack Vector
Adjacent
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
None
Integrity
None
Availability
High

Affected Versions

Cisco / Cisco NX-OS Software
9.2(3) 9.2(2v) 9.2(1) 9.2(2t) 9.2(3y) 9.3(2) 9.2(4) 9.3(1) 9.3(1z) 9.2(2) 9.3(3) 9.3(4) 9.3(5) 9.3(6) 9.3(5w) 9.3(7) 9.3(7k) 10.2(1) 9.3(7a) 9.3(8) 10.2(1q) 10.2(2) 9.3(9) 10.2(3) 10.2(3t) 9.3(10) 10.2(2a) 10.3(1) 10.2(4) 10.3(2) 9.3(11) 10.3(3) 10.2(5) 9.3(12) 10.2(3v) 10.4(1) 10.2(6) 10.3(3w) 10.3(3o) 10.3(4) 10.3(3p) 10.3(4a) 10.4(2) 10.3(3q) 9.3(13) 10.3(5) 10.2(7) 10.4(3) 10.3(3x) 10.3(4g) 10.5(1) 10.2(8) 10.3(3r) 10.3(6) 9.3(14) 10.4(4) 10.3(4h) 10.5(2) 10.3(7) 10.4(5) 10.5(3) 10.2(9) 9.3(15) 10.4(4g) 10.5(4) 10.6(1) 10.5(3t) 10.3(8) 10.4(6) 10.5(3s) 10.5(3e) 10.5(3o) 9.3(16) 10.6(1s) 10.5(3p)

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
sec.cloudapps.cisco.com: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-ether-dos-Kv8YNWZ4