Home Cisco CVE-2026-20125
Back to Cisco

CVE-2026-20125

Cisco IOS Software - HTTP Server

Cisco CVSS 7.7 Updated March 31, 2026

Executive Risk Summary

"A vulnerability in the HTTP Server feature of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker to cause an affected device to reload unexpectedly, resulting in a denial of service (DoS) condition. This vulnerability is due to improper validation of user-supplied input, which can be exploited by sending malformed HTTP requests to an affected device."

Anticipated Attack Path

  1. 1. Attacker gains a valid user account on the affected device
  2. 2. Attacker sends malformed HTTP requests to the device's HTTP Server
  3. 3. Device reloads due to watchdog timer expiration, causing a denial of service condition

Am I Vulnerable?

  • Is the device running Cisco IOS Software or Cisco IOS XE Software Release 3E?
  • Is the HTTP Server feature enabled on the device?
  • Have all relevant security patches been applied to the device?

Operational Audit Arsenal

Target Type Web Server
Target Asset HTTP Server
Standard Path Management Plane / Web UI

Manual Verification Required

This is a non-Windows asset (Cisco). Use the target asset details and official path provided above to verify your current version against the official vendor advisories listed below.

Patch Impact Forecast

Reboot Required Likely

Potential disruption to network services during patch application

Internal Work Notes

CVE-2026-20125: Potential DoS vulnerability in Cisco IOS Software HTTP Server, requiring patch application and validation of user-supplied input

Technical Intelligence & Operational Utilities • Delivered Weekly

Intelligence Sources

Related Cisco Threats

Data compiled from NVD, MSRC, and CISA KEV Catalog. Intelligence synthesized via AI. Scripts provided for diagnostic purposes under MIT License.