Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
7.7

Cisco Nexus 9000 Series Switches in ACI mode: Denial of Service via SNMP

CVE-2026-20048
Summary

A security issue in Cisco Nexus 9000 Series Switches in ACI mode allows an attacker to shut down the device by sending specific network messages. This affects switches that use SNMP to manage network data. To fix this, update your switch's software to the latest version.

Original title
A vulnerability in the Simple Network Management Protocol (SNMP) subsystem of Cisco Nexus 9000 Series Fabric Switches in ACI mode could allow an authenticated, remote attacker to cause a denial of ...
Original description
A vulnerability in the Simple Network Management Protocol (SNMP) subsystem of Cisco Nexus 9000 Series Fabric Switches in ACI mode could allow an authenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.

This vulnerability is due to improper processing when parsing SNMP requests. An attacker could exploit this vulnerability by continuously sending SNMP queries to a specific MIB of an affected device. A successful exploit could allow the attacker to cause a kernel panic on the device, resulting in a reload and a DoS condition.
Note: This vulnerability affects SNMP versions 1, 2c, and 3. To exploit this vulnerability through SNMPv1 or SNMPv2c, the attacker must have a valid read-only SNMP community string for the affected system. To exploit this vulnerability through SNMPv3, the attacker must have valid SNMP user credentials for the affected system.
nvd CVSS3.1 7.7
Vulnerability type
CWE-789
Published: 25 Feb 2026 · Updated: 12 Mar 2026 · First seen: 6 Mar 2026