Cisco Warns of High-Severity DoS Flaw (CVE-2025-20241) in Nexus Switches



Ddos




August 28, 2025

Cisco Nexus, vulnerability CVE-2024-20412 - Cisco data breach

Cisco Systems has published a security advisory detailing a high-severity denial-of-service (DoS) vulnerability affecting Cisco Nexus 3000 and 9000 Series Switches running NX-OS software. The flaw, tracked as CVE-2025-20241 with a CVSS score of 7.4, could allow an unauthenticated, adjacent attacker to disrupt core network operations.

Cisco explains that “a vulnerability in the Intermediate System-to-Intermediate System (IS-IS) feature of Cisco NX-OS Software… could allow an unauthenticated, adjacent attacker to cause the IS-IS process to unexpectedly restart, which could cause an affected device to reload.”

The issue arises from insufficient input validation when parsing incoming IS-IS packets. By sending a crafted IS-IS packet to a vulnerable device, attackers could force the IS-IS process to crash and reload, resulting in a denial of service condition.

Exploitation is limited to attackers with Layer 2 adjacency to the targeted device. The advisory clarifies: “This vulnerability can only be exploited by an adjacent IS-IS peer in the UP state. If IS-IS authentication is enabled, the IS-IS peer would need to use a valid key to exploit this vulnerability.”

Administrators can check whether IS-IS is enabled by running:

show running-config | include isis

If configuration commands such as feature isis, router isis <name>, and ip router isis <name> appear, IS-IS is active. Similarly, the show isis adjacency command reveals active IS-IS peers.

The vulnerability affects:

  • Cisco Nexus 3000 Series Switches
  • Cisco Nexus 9000 Series Switches in standalone NX-OS mode

Only devices with the IS-IS routing protocol enabled are vulnerable.

Cisco has released free software updates to patch the flaw. Customers with service contracts can obtain fixes through their standard update channels.

For organizations unable to upgrade immediately, enabling IS-IS authentication with strong keys significantly reduces the risk of exploitation.

Organizations running Nexus 3000 and 9000 switches should apply Cisco’s patches without delay and review their IS-IS configurations to harden defenses.

Related Posts:

Previous Article

Chinese State Hackers Target Global Critical Infrastructure, NSA Warns

Next Article

CISA Publish Hunting and Mitigation Guide to Defend Networks from Chinese State-Sponsored Actors

Write a Comment

Leave a Comment

Your email address will not be published. Required fields are marked *