CVE-2025-20241

Cisco · Cisco Multiple Products

A high-severity vulnerability, identified as CVE-2025-20241, exists in the IS-IS routing protocol feature of certain Cisco Nexus switches.

Executive summary

A high-severity vulnerability, identified as CVE-2025-20241, exists in the IS-IS routing protocol feature of certain Cisco Nexus switches. An unauthenticated attacker on the same local network could exploit this flaw to crash the routing process, potentially forcing the entire network device to reboot. This would result in a significant network outage and a denial of service for connected systems.

Vulnerability

The vulnerability lies within the IS-IS protocol implementation on Cisco NX-OS software. An unauthenticated attacker who is network-adjacent (i.e., on the same Layer 2 segment) can send a specially crafted IS-IS packet to a vulnerable device. Improper processing of this packet triggers a fault in the IS-IS process, causing it to restart. Due to the architecture of the NX-OS software on affected platforms, the crash of a critical process like IS-IS can lead to a full system reload, resulting in a complete denial of service.

Business impact

This vulnerability is rated as High severity with a CVSS score of 7.4. A successful exploit would result in a denial of service (DoS) condition by rebooting a core network switch. This can lead to widespread network outages, disrupting all business operations that rely on the affected infrastructure. The potential consequences include loss of application availability, interruption of critical services, and potential financial and reputational damage. The risk is particularly acute for organizations that use Cisco Nexus 3000 or 9000 series switches in key data center or campus network roles where high availability is paramount.

Remediation

Immediate Action: Apply vendor security updates immediately to all affected Cisco Nexus 3000 and 9000 series switches. Before patching, review change management procedures and test updates in a non-production environment if possible. After patching, monitor for any signs of exploitation attempts and review device access and system logs for anomalous activity.

Proactive Monitoring: Monitor system logs (syslog) on affected devices for any unexpected IS-IS process restarts or system reload messages. Configure network monitoring systems to generate alerts for device unavailability or routing protocol adjacency flaps, which could indicate a successful exploit. Analyze IS-IS traffic for malformed or unusual packets if deep packet inspection capabilities are available.

Compensating Controls: If immediate patching is not feasible, implement compensating controls to reduce the attack surface. Apply access control lists (ACLs) to IS-IS-enabled interfaces to permit traffic only from trusted, known adjacent routers. Implement robust Layer 2 security measures, such as port security and DHCP snooping, to prevent unauthorized devices from gaining adjacent network access.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the High severity rating (CVSS 7.4) and the potential for a complete network device outage, organizations are strongly advised to prioritize the patching of this vulnerability. Although there is no current evidence of active exploitation, the low attack complexity (unauthenticated, adjacent attacker) increases the likelihood that an exploit could be developed. Applying the vendor-provided security updates is the most effective way to mitigate the risk of network disruption and ensure business continuity.