{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-20033","assignerOrgId":"d1c1063e-7a18-46af-9102-31f8928bc633","state":"PUBLISHED","assignerShortName":"cisco","dateReserved":"2025-10-08T11:59:15.353Z","datePublished":"2026-02-25T16:26:29.215Z","dateUpdated":"2026-02-25T19:05:48.146Z"},"containers":{"cna":{"title":"Cisco NX-OS Software Denial of Service Vulnerability","metrics":[{"format":"cvssV3_1","cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H","baseScore":7.4,"baseSeverity":"HIGH","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"}}],"descriptions":[{"lang":"en","value":"A vulnerability in Cisco Nexus 9000 Series Fabric Switches in ACI mode could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device.\r\n\r\nThis vulnerability is due to insufficient validation when processing specific Ethernet frames. An attacker could exploit this vulnerability by sending a crafted Ethernet frame to the&nbsp;management interface of an affected device. A successful exploit could allow the attacker to cause the device to reload unexpectedly, resulting in a DoS condition.\r\nNote: Only the out-of-band (OOB) management interface is affected."}],"references":[{"url":"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-cpdos-qLsv6pFD","name":"cisco-sa-nxos-cpdos-qLsv6pFD"}],"exploits":[{"lang":"en","value":"The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."}],"source":{"advisory":"cisco-sa-nxos-cpdos-qLsv6pFD","discovery":"EXTERNAL","defects":["CSCwq96001"]},"problemTypes":[{"descriptions":[{"lang":"en","description":"Buffer Access with Incorrect Length Value","type":"cwe","cweId":"CWE-805"}]}],"affected":[{"vendor":"Cisco","product":"Cisco NX-OS System Software in ACI Mode","versions":[{"version":"15.2(1g)","status":"affected"},{"version":"15.2(2e)","status":"affected"},{"version":"15.2(2f)","status":"affected"},{"version":"15.2(2g)","status":"affected"},{"version":"15.2(2h)","status":"affected"},{"version":"15.2(3f)","status":"affected"},{"version":"15.2(3e)","status":"affected"},{"version":"15.2(3g)","status":"affected"},{"version":"15.2(4d)","status":"affected"},{"version":"15.2(4e)","status":"affected"},{"version":"15.2(5c)","status":"affected"},{"version":"15.2(5d)","status":"affected"},{"version":"16.0(1g)","status":"affected"},{"version":"15.2(5e)","status":"affected"},{"version":"15.2(4f)","status":"affected"},{"version":"15.2(6e)","status":"affected"},{"version":"15.2(6h)","status":"affected"},{"version":"16.0(1j)","status":"affected"},{"version":"15.2(6g)","status":"affected"},{"version":"15.2(7f)","status":"affected"},{"version":"15.2(7g)","status":"affected"},{"version":"16.0(2h)","status":"affected"},{"version":"15.2(8d)","status":"affected"},{"version":"16.0(2j)","status":"affected"},{"version":"15.2(8e)","status":"affected"},{"version":"16.0(3d)","status":"affected"},{"version":"16.0(3e)","status":"affected"},{"version":"15.2(8f)","status":"affected"},{"version":"15.2(8g)","status":"affected"},{"version":"15.3(1d)","status":"affected"},{"version":"15.2(8h)","status":"affected"},{"version":"16.0(4c)","status":"affected"},{"version":"15.3(2a)","status":"affected"},{"version":"15.2(8i)","status":"affected"},{"version":"16.0(5h)","status":"affected"},{"version":"15.3(2b)","status":"affected"},{"version":"16.0(3g)","status":"affected"},{"version":"16.0(5j)","status":"affected"},{"version":"15.3(2c)","status":"affected"},{"version":"16.0(6c)","status":"affected"},{"version":"15.3(2d)","status":"affected"},{"version":"16.1(1f)","status":"affected"},{"version":"16.0(7e)","status":"affected"},{"version":"16.0(8e)","status":"affected"},{"version":"15.3(2e)","status":"affected"},{"version":"16.0(8f)","status":"affected"},{"version":"16.1(2f)","status":"affected"},{"version":"16.1(2g)","status":"affected"},{"version":"15.3(2f)","status":"affected"},{"version":"16.0(9c)","status":"affected"},{"version":"16.1(3f)","status":"affected"},{"version":"16.0(9d)","status":"affected"},{"version":"16.0(6h)","status":"affected"},{"version":"16.0(8h)","status":"affected"},{"version":"16.1(3g)","status":"affected"},{"version":"16.0(9e)","status":"affected"},{"version":"16.1(4h)","status":"affected"}],"defaultStatus":"unknown"}],"providerMetadata":{"orgId":"d1c1063e-7a18-46af-9102-31f8928bc633","shortName":"cisco","dateUpdated":"2026-02-25T16:26:29.215Z"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2026-20033","role":"CISA Coordinator","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"version":"2.0.3","timestamp":"2026-02-25T18:18:01.739135Z"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-02-25T19:05:48.146Z"}}]}}