Home Cisco CVE-2026-20051
Back to Cisco

CVE-2026-20051

Nexus 3600 Platform Switches - EVPN

Cisco CVSS 7.4 Updated March 16, 2026

Executive Risk Summary

"A vulnerability in the Ethernet VPN (EVPN) Layer 2 ingress packet processing of Cisco Nexus 3600 Platform Switches and Cisco Nexus 9500-R Series Switching Platforms could allow an unauthenticated, adjacent attacker to trigger a Layer 2 traffic loop, resulting in a denial of service (DoS) condition. The attacker must be Layer 2-adjacent to the affected device to exploit this vulnerability."

Operational Audit Arsenal

Target Type Firmware
Target Asset Cisco Nexus OS
Standard Path Cisco Nexus 3600 Platform Switches and Cisco Nexus 9500-R Series Switching Platforms

Manual Verification Required

This is a non-Windows asset (Cisco). Use the target asset details and official path provided above to verify your current version against the official vendor advisories listed below.

Patch Impact Forecast

Reboot Required Likely

Network disruption possible due to required manual intervention to stop crafted traffic and flap involved network interfaces

Internal Work Notes

Potential Layer 2 traffic loop vulnerability in Cisco Nexus switches, requiring manual intervention to stop exploitation and prevent network disruption

Technical Intelligence & Operational Utilities • Delivered Weekly

Intelligence Sources

Related Cisco Threats

Data compiled from NVD, MSRC, and CISA KEV Catalog. Intelligence synthesized via AI. Scripts provided for diagnostic purposes under MIT License.