Cisco Systems has disclosed a high-severity vulnerability (CVE-2025-20111) in its Nexus 3000 and 9000 Series Switches operating in standalone NX-OS mode.
The vulnerability enables unauthenticated attackers to trigger denial of service (DoS) conditions through crafted Ethernet frames.
Rated 7.4 on the CVSS v3.1 scale, the flaw affects critical infrastructure components widely used in enterprise and data center environments.
The vulnerability stems from improper handling of specific Ethernet frames within the switches’ health monitoring diagnostics subsystem.
Attackers exploiting this flaw can send a sustained stream of malicious packets to vulnerable devices, causing unexpected reloads and prolonged service disruptions.
Unlike vulnerabilities requiring authentication or administrative access, this weakness allows adjacent attackers—those with network proximity to the target device—to execute attacks without credentials.
Cisco’s advisory clarifies that exploitation does not permit data theft or system takeover but emphasizes the operational risks of repeated device reboots.
In high-availability environments, such outages could cascade into critical application downtime, financial losses, and compliance violations.
The impacted hardware includes:
Cisco has confirmed immunity for several product lines, including Nexus 7000 Series, MDS 9000 Series switches, and all Nexus 9000 devices operating in Application-Centric Infrastructure (ACI) mode.
The company has released patched software versions addressing the flaw and recommends immediate upgrades for vulnerable systems.
Workarounds such as access control list (ACL) modifications to filter malicious traffic are available for organizations unable to deploy updates promptly.
This vulnerability highlights risks inherent in network health monitoring systems, which often operate with elevated privileges.
With Nexus switches forming the backbone of many enterprise networks, widespread exploitation could disrupt healthcare and finance sectors.
Cisco’s Product Security Incident Response Team (PSIRT) has incorporated this advisory into its February 2025 FXOS/NX-OS Security Advisory Bundle—a quarterly publication detailing critical fixes for Cisco’s switching and firewall platforms.
The coordinated disclosure follows Cisco’s standard vulnerability management practices, providing network administrators with detailed upgrade paths and mitigation strategies.
As enterprises increasingly rely on automated network infrastructures, this vulnerability underscores the importance of rigorous patch management cycles and defense-in-depth strategies.
With no publicly documented exploits at press time, proactive mitigation offers organizations a critical window to safeguard their networks against potential attacks.
For technical specifics, Cisco’s full advisory (cisco-sa-n3kn9k-healthdos-eOqSWK4g) provides configuration guidance and patching timelines.
Security teams should cross-reference their infrastructure against Cisco’s impacted products list and initiate remediation workflows to neutralize this persistent threat vector.
Collect Threat Intelligence on the Latest Malware and Phishing Attacks with ANY.RUN TI Lookup -> Try for free
Lattica, an FHE-based platform enabling secure and private use of AI in the cloud, has…
A critical vulnerability (CVE-2025-0618) in FireEye’s Endpoint Detection and Response (EDR) agent has been disclosed,…
A recently uncovered malware campaign targeting Docker, one of the most frequently attacked services according…
Researchers have disclosed a series of alarming vulnerabilities in popular browser-based cryptocurrency wallets that could…
Researchers have uncovered early indicators of malicious infrastructure linked to APT34, also known as OilRig,…
A sophisticated phishing campaign has been uncovered by Fortinet’s FortiGuard Labs, targeting Windows users with…