Cisco Patches Security Vulnerabilities in Nexus Switches to Prevent DoS and Command Injection Attacks

86/68 Tuesday, March 4, 2025

Cisco has released security updates to address vulnerabilities affecting Nexus 3000 and Nexus 9000 series switches running NX-OS in standalone mode. The first vulnerability, CVE-2025-20111 (CVSS 7.4), stems from improper handling of Ethernet frames, allowing an attacker within the same network to send specially crafted frames that can cause the device to reload, leading to a Denial-of-Service (DoS) attack.

Another fixed vulnerability, CVE-2025-20161 (CVSS 5.1), is a command injection flaw that occurs during a software upgrade. An attacker with Administrator-level privileges could exploit this weakness to execute unauthorized commands on the operating system, potentially gaining unauthorized control over the device.

Affected Devices:

  • Nexus 3100 Series Switches
  • Nexus 3200 Series Switches
  • Nexus 3400 Series Switches
  • Nexus 3600 Series Switches
  • Nexus 9200, 9300, and 9400 Series Switches (running NX-OS in standalone mode)

Cisco urges system administrators to update their software to the latest version as soon as possible to mitigate potential attacks. While there have been no reported instances of these vulnerabilities being exploited in the wild, prompt patching is strongly recommended to ensure network security.

Source  https://securityaffairs.com/174753/security/cisco-fixed-command-injection-and-dos-flaws-in-nexus-switches.html