{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T01:08:13.114","vulnerabilities":[{"cve":{"id":"CVE-2026-20051","sourceIdentifier":"psirt@cisco.com","published":"2026-02-25T17:25:26.487","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability with the Ethernet VPN (EVPN) Layer 2 ingress packet processing of Cisco Nexus 3600 Platform Switches and Cisco Nexus 9500-R Series Switching Platforms could allow an unauthenticated, adjacent attacker to trigger a Layer 2 traffic loop.\r\n\r\nThis vulnerability is due to a logic error when processing a crafted Layer 2 ingress frame. An attacker could exploit this vulnerability by sending a stream of crafted Ethernet frames through the targeted device. A successful exploit could allow the attacker to cause a Layer 2 Virtual eXtensible LAN (VxLAN) traffic loop, which, in turn, could result in a denial of service (DoS) condition. This Layer 2 loop could oversubscribe the bandwidth on network interfaces, which would result in all data plane traffic being dropped. To exploit this vulnerability, the attacker must be Layer 2-adjacent to the affected device.\r\nNote:&nbsp;To stop active exploitation of this vulnerability, manual intervention is required to both stop the crafted traffic and flap all involved network interfaces. For additional assistance if a Layer 2 loop that is related to this vulnerability is suspected, contact the Cisco Technical Assistance Center (TAC) or the proper support provider.&nbsp;"},{"lang":"es","value":"Una vulnerabilidad en el procesamiento de paquetes de entrada de Capa 2 de Ethernet VPN (EVPN) de los switches de plataforma Cisco Nexus 3600 y las plataformas de switching Cisco Nexus 9500-R Series podría permitir a un atacante adyacente no autenticado desencadenar un bucle de tráfico de Capa 2.\n\nEsta vulnerabilidad se debe a un error de lógica al procesar una trama de entrada de Capa 2 manipulada. Un atacante podría explotar esta vulnerabilidad enviando un flujo de tramas Ethernet manipuladas a través del dispositivo objetivo. Un exploit exitoso podría permitir al atacante causar un bucle de tráfico de Capa 2 de Virtual eXtensible LAN (VxLAN), lo que, a su vez, podría resultar en una condición de denegación de servicio (DoS). Este bucle de Capa 2 podría sobresaturar el ancho de banda en las interfaces de red, lo que resultaría en la caída de todo el tráfico del plano de datos. Para explotar esta vulnerabilidad, el atacante debe ser adyacente en Capa 2 al dispositivo afectado.\nNota: Para detener la explotación activa de esta vulnerabilidad, se requiere intervención manual tanto para detener el tráfico manipulado como para reiniciar todas las interfaces de red involucradas. Para asistencia adicional si se sospecha de un bucle de Capa 2 relacionado con esta vulnerabilidad, contacte con el Centro de Asistencia Técnica de Cisco (TAC) o con el proveedor de soporte adecuado."}],"metrics":{"cvssMetricV31":[{"source":"psirt@cisco.com","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H","baseScore":7.4,"baseSeverity":"HIGH","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":4.0}]},"weaknesses":[{"source":"psirt@cisco.com","type":"Primary","description":[{"lang":"en","value":"CWE-457"}]}],"references":[{"url":"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-ether-dos-Kv8YNWZ4","source":"psirt@cisco.com"}]}}]}