Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
7.4

Cisco Nexus 9000 Switches in ACI mode at risk of sudden reboot

CVE-2026-20033
Summary

An attacker can send a special type of packet to a Cisco Nexus 9000 switch in certain mode, causing it to crash and restart. This can happen without the attacker needing a password. Affected organizations should check their networks and apply any available security updates to prevent this from happening.

Original title
A vulnerability in Cisco Nexus 9000 Series Fabric Switches in ACI mode could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. This ...
Original description
A vulnerability in Cisco Nexus 9000 Series Fabric Switches in ACI mode could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device.

This vulnerability is due to insufficient validation when processing specific Ethernet frames. An attacker could exploit this vulnerability by sending a crafted Ethernet frame to the management interface of an affected device. A successful exploit could allow the attacker to cause the device to reload unexpectedly, resulting in a DoS condition.
Note: Only the out-of-band (OOB) management interface is affected.
nvd CVSS3.1 7.4
Vulnerability type
CWE-805
Published: 25 Feb 2026 · Updated: 12 Mar 2026 · First seen: 6 Mar 2026