{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-04T09:39:27.746","vulnerabilities":[{"cve":{"id":"CVE-2026-20048","sourceIdentifier":"psirt@cisco.com","published":"2026-02-25T17:25:25.620","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability in the Simple Network Management Protocol (SNMP) subsystem of Cisco Nexus 9000 Series Fabric Switches in ACI mode could allow an authenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.\r\n\r\nThis vulnerability is due to improper processing when parsing SNMP requests. An attacker could exploit this vulnerability by continuously sending SNMP queries&nbsp;to a specific MIB of an affected device. A successful exploit could allow the attacker to cause a kernel panic on the device, resulting in a reload and a&nbsp;DoS condition.\r\nNote: This vulnerability affects SNMP versions 1, 2c, and 3. To exploit&nbsp;this vulnerability through SNMPv1 or&nbsp;SNMPv2c, the attacker must have a valid read-only SNMP community string for the affected system. To exploit this vulnerability through SNMPv3, the attacker must have valid SNMP user credentials for the affected system."},{"lang":"es","value":"Una vulnerabilidad en el subsistema del Protocolo Simple de Gestión de Red (SNMP) de los switches de tejido Cisco Nexus serie 9000 en modo ACI podría permitir a un atacante remoto autenticado causar una condición de denegación de servicio (DoS) en un dispositivo afectado.\n\nEsta vulnerabilidad se debe a un procesamiento incorrecto al analizar solicitudes SNMP. Un atacante podría explotar esta vulnerabilidad enviando continuamente consultas SNMP a una MIB específica de un dispositivo afectado. Un exploit exitoso podría permitir al atacante causar un pánico del kernel en el dispositivo, lo que resultaría en una recarga y una condición de DoS.\nNota: Esta vulnerabilidad afecta las versiones 1, 2c y 3 de SNMP. Para explotar esta vulnerabilidad a través de SNMPv1 o SNMPv2c, el atacante debe tener una cadena de comunidad SNMP de solo lectura válida para el sistema afectado. Para explotar esta vulnerabilidad a través de SNMPv3, el atacante debe tener credenciales de usuario SNMP válidas para el sistema afectado."}],"metrics":{"cvssMetricV31":[{"source":"psirt@cisco.com","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H","baseScore":7.7,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.1,"impactScore":4.0}]},"weaknesses":[{"source":"psirt@cisco.com","type":"Primary","description":[{"lang":"en","value":"CWE-789"}]}],"references":[{"url":"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-dsnmp-cNN39Uh","source":"psirt@cisco.com"}]}}]}