CVE-2026-20010 (GCVE-0-2026-20010)

Vulnerability from cvelistv5 – Published: 2026-02-25 16:18 – Updated: 2026-02-25 19:05
VLAI?
Title
Cisco Nexus 3000 and 9000 Series Switches Link Layer Discovery Protocol Denial of Service Vulnerability
Summary
A vulnerability in the Link Layer Discovery Protocol (LLDP) feature of Cisco NX-OS Software could allow an unauthenticated, adjacent attacker to cause the LLDP process to restart, which could cause an affected device to reload unexpectedly. This vulnerability is due to improper handling of specific fields in an LLDP frame. An attacker could exploit this vulnerability by sending a crafted LLDP packet to an interface of an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a denial of service (DoS) condition. Note: LLDP is a Layer 2 link protocol. To exploit this vulnerability, an attacker would need to be directly connected to an interface of an affected device, either physically or logically (for example, through a Layer 2 Tunnel configured to transport the LLDP protocol).
CWE
  • CWE-805 - Buffer Access with Incorrect Length Value
Assigner
Impacted products
Vendor Product Version
Cisco Cisco NX-OS Software Affected: 10.3(1)
Affected: 10.3(2)
Affected: 10.3(3)
Affected: 10.4(1)
Affected: 10.3(99w)
Affected: 10.3(3w)
Affected: 10.3(99x)
Affected: 10.3(3o)
Affected: 10.3(4)
Affected: 10.3(3p)
Affected: 10.3(4a)
Affected: 10.4(2)
Affected: 10.3(3q)
Affected: 10.3(3x)
Affected: 10.3(4g)
Affected: 10.3(3r)
Affected: 10.3(4h)
Create a notification for this product.
    Cisco Cisco NX-OS System Software in ACI Mode Affected: 16.0(2h)
Affected: 16.0(2j)
Affected: 16.0(3d)
Affected: 16.0(3e)
Affected: 16.0(4c)
Affected: 16.0(5h)
Affected: 16.0(3g)
Affected: 16.0(5j)
Affected: 16.0(6c)
Affected: 16.1(1f)
Affected: 16.0(7e)
Affected: 16.0(8e)
Affected: 16.0(8f)
Affected: 16.1(2f)
Affected: 16.1(2g)
Affected: 16.0(9c)
Affected: 16.1(3f)
Affected: 16.0(9d)
Affected: 16.0(6h)
Affected: 16.0(8h)
Affected: 16.1(3g)
Create a notification for this product.
    Cisco Cisco Unified Computing System (Managed) Affected: 4.3(4e)
Affected: 4.3(6b)
Affected: 4.3(4c)
Affected: 4.3(4f)
Affected: 4.3(6d)
Affected: 4.3(5e)
Affected: 4.3(4d)
Affected: 4.3(4b)
Affected: 4.3(5a)
Affected: 4.3(5c)
Affected: 4.3(5d)
Affected: 4.3(6c)
Affected: 4.3(6a)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2026-20010",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-02-25T18:18:44.628066Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-02-25T19:05:49.108Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "product": "Cisco NX-OS Software",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "10.3(1)"
            },
            {
              "status": "affected",
              "version": "10.3(2)"
            },
            {
              "status": "affected",
              "version": "10.3(3)"
            },
            {
              "status": "affected",
              "version": "10.4(1)"
            },
            {
              "status": "affected",
              "version": "10.3(99w)"
            },
            {
              "status": "affected",
              "version": "10.3(3w)"
            },
            {
              "status": "affected",
              "version": "10.3(99x)"
            },
            {
              "status": "affected",
              "version": "10.3(3o)"
            },
            {
              "status": "affected",
              "version": "10.3(4)"
            },
            {
              "status": "affected",
              "version": "10.3(3p)"
            },
            {
              "status": "affected",
              "version": "10.3(4a)"
            },
            {
              "status": "affected",
              "version": "10.4(2)"
            },
            {
              "status": "affected",
              "version": "10.3(3q)"
            },
            {
              "status": "affected",
              "version": "10.3(3x)"
            },
            {
              "status": "affected",
              "version": "10.3(4g)"
            },
            {
              "status": "affected",
              "version": "10.3(3r)"
            },
            {
              "status": "affected",
              "version": "10.3(4h)"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "Cisco NX-OS System Software in ACI Mode",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "16.0(2h)"
            },
            {
              "status": "affected",
              "version": "16.0(2j)"
            },
            {
              "status": "affected",
              "version": "16.0(3d)"
            },
            {
              "status": "affected",
              "version": "16.0(3e)"
            },
            {
              "status": "affected",
              "version": "16.0(4c)"
            },
            {
              "status": "affected",
              "version": "16.0(5h)"
            },
            {
              "status": "affected",
              "version": "16.0(3g)"
            },
            {
              "status": "affected",
              "version": "16.0(5j)"
            },
            {
              "status": "affected",
              "version": "16.0(6c)"
            },
            {
              "status": "affected",
              "version": "16.1(1f)"
            },
            {
              "status": "affected",
              "version": "16.0(7e)"
            },
            {
              "status": "affected",
              "version": "16.0(8e)"
            },
            {
              "status": "affected",
              "version": "16.0(8f)"
            },
            {
              "status": "affected",
              "version": "16.1(2f)"
            },
            {
              "status": "affected",
              "version": "16.1(2g)"
            },
            {
              "status": "affected",
              "version": "16.0(9c)"
            },
            {
              "status": "affected",
              "version": "16.1(3f)"
            },
            {
              "status": "affected",
              "version": "16.0(9d)"
            },
            {
              "status": "affected",
              "version": "16.0(6h)"
            },
            {
              "status": "affected",
              "version": "16.0(8h)"
            },
            {
              "status": "affected",
              "version": "16.1(3g)"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "Cisco Unified Computing System (Managed)",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "4.3(4e)"
            },
            {
              "status": "affected",
              "version": "4.3(6b)"
            },
            {
              "status": "affected",
              "version": "4.3(4c)"
            },
            {
              "status": "affected",
              "version": "4.3(4f)"
            },
            {
              "status": "affected",
              "version": "4.3(6d)"
            },
            {
              "status": "affected",
              "version": "4.3(5e)"
            },
            {
              "status": "affected",
              "version": "4.3(4d)"
            },
            {
              "status": "affected",
              "version": "4.3(4b)"
            },
            {
              "status": "affected",
              "version": "4.3(5a)"
            },
            {
              "status": "affected",
              "version": "4.3(5c)"
            },
            {
              "status": "affected",
              "version": "4.3(5d)"
            },
            {
              "status": "affected",
              "version": "4.3(6c)"
            },
            {
              "status": "affected",
              "version": "4.3(6a)"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the Link Layer Discovery Protocol (LLDP) feature of Cisco NX-OS Software could allow an unauthenticated, adjacent attacker to cause the LLDP process to restart, which could cause an affected device to reload unexpectedly.\r\n\r\nThis vulnerability is due to improper handling of specific fields in an LLDP frame. An attacker could exploit this vulnerability by sending a crafted LLDP packet to an interface of an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a denial of service (DoS) condition.\r\nNote:\u0026nbsp;LLDP is a Layer 2 link protocol. To exploit this vulnerability, an attacker would need to be\u0026nbsp;directly connected to an interface of an affected device, either physically or logically (for example, through a Layer 2 Tunnel configured to transport the LLDP protocol)."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.4,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
            "version": "3.1"
          },
          "format": "cvssV3_1"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-805",
              "description": "Buffer Access with Incorrect Length Value",
              "lang": "en",
              "type": "cwe"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-02-25T16:18:14.561Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "cisco-sa-n3kn9k_aci_lldp_dos-NdgRrrA3",
          "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-n3kn9k_aci_lldp_dos-NdgRrrA3"
        }
      ],
      "source": {
        "advisory": "cisco-sa-n3kn9k_aci_lldp_dos-NdgRrrA3",
        "defects": [
          "CSCwq33193"
        ],
        "discovery": "EXTERNAL"
      },
      "title": "Cisco Nexus 3000 and 9000 Series Switches Link Layer Discovery Protocol Denial of Service Vulnerability"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2026-20010",
    "datePublished": "2026-02-25T16:18:14.561Z",
    "dateReserved": "2025-10-08T11:59:15.350Z",
    "dateUpdated": "2026-02-25T19:05:49.108Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2026-20010\",\"sourceIdentifier\":\"psirt@cisco.com\",\"published\":\"2026-02-25T17:25:24.110\",\"lastModified\":\"2026-02-25T17:25:24.110\",\"vulnStatus\":\"Received\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability in the Link Layer Discovery Protocol (LLDP) feature of Cisco NX-OS Software could allow an unauthenticated, adjacent attacker to cause the LLDP process to restart, which could cause an affected device to reload unexpectedly.\\r\\n\\r\\nThis vulnerability is due to improper handling of specific fields in an LLDP frame. An attacker could exploit this vulnerability by sending a crafted LLDP packet to an interface of an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a denial of service (DoS) condition.\\r\\nNote:\u0026nbsp;LLDP is a Layer 2 link protocol. To exploit this vulnerability, an attacker would need to be\u0026nbsp;directly connected to an interface of an affected device, either physically or logically (for example, through a Layer 2 Tunnel configured to transport the LLDP protocol).\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"psirt@cisco.com\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H\",\"baseScore\":7.4,\"baseSeverity\":\"HIGH\",\"attackVector\":\"ADJACENT_NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":4.0}]},\"weaknesses\":[{\"source\":\"psirt@cisco.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-805\"}]}],\"references\":[{\"url\":\"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-n3kn9k_aci_lldp_dos-NdgRrrA3\",\"source\":\"psirt@cisco.com\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…