CVE-2026-20048
Cisco · Nexus 9000 Series Fabric Switches
A vulnerability in the SNMP subsystem of Cisco Nexus 9000 Series switches could allow an authenticated attacker to cause a denial of service condition.
Executive summary
Authenticated attackers can cause a total denial of service on Cisco Nexus 9000 Series switches by exploiting a flaw in the SNMP subsystem.
Vulnerability
This vulnerability exists in the Simple Network Management Protocol (SNMP) subsystem of switches operating in ACI mode. An authenticated, remote attacker can exploit this flaw to trigger a crash or reload of the device, resulting in a denial of service (DoS) condition.
Business impact
A denial of service on core fabric switches can lead to significant network outages, disrupting data center operations and affecting all connected services. While the attacker must be authenticated, the potential for operational downtime and the high CVSS score of 7.7 make this a significant risk for enterprise networking environments.
Remediation
Immediate Action: Apply the security updates provided by Cisco for the Nexus 9000 Series software to resolve the SNMP subsystem flaw.
Proactive Monitoring: Monitor SNMP traffic for unusual polling patterns and review system logs for unexpected reboots or SNMP process crashes.
Compensating Controls: Restrict SNMP access to trusted management hosts using Access Control Lists (ACLs) and use SNMPv3 with strong authentication and encryption.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Network stability is critical for business continuity. Administrators should prioritize the patching of Cisco Nexus switches and ensure that SNMP access is strictly controlled to mitigate the risk of an internal DoS attack.