First published: Wed Feb 26 2025(Updated: )
A vulnerability in the health monitoring diagnostics of Cisco Nexus 3000 Series Switches and Cisco Nexus 9000 Series Switches in standalone NX-OS mode could allow an unauthenticated, adjacent attacker to cause the device to reload unexpectedly, resulting in a denial of service (DoS) condition. This vulnerability is due to the incorrect handling of specific Ethernet frames. An attacker could exploit this vulnerability by sending a sustained rate of crafted Ethernet frames to an affected device. A successful exploit could allow the attacker to cause the device to reload.
Credit: psirt@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Nexus Series | ||
Cisco Nexus 9000 Series Application Centric Infrastructure (ACI) Mode Switch Software |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-20111 is classified as a high severity vulnerability that can lead to denial of service for affected devices.
To address CVE-2025-20111, it is recommended to apply the latest firmware updates available from Cisco for the affected Nexus switches.
CVE-2025-20111 affects Cisco Nexus 3000 Series Switches and Cisco Nexus 9000 Series Switches operating in standalone NX-OS mode.
The vulnerability could allow an unauthenticated adjacent attacker to cause the device to unexpectedly reload, resulting in a denial of service.
No, CVE-2025-20111 can be exploited by an unauthenticated attacker who is adjacent to the affected network device.