<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Nexus 9000 Series Switches — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/nexus-9000-series-switches/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 20 May 2026 16:02:17 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/nexus-9000-series-switches/feed.xml" rel="self" type="application/rss+xml"/><item><title>Cisco Nexus 3000 and 9000 Series Switches BGP Denial of Service Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-cisco-nexus-bgp-dos/</link><pubDate>Wed, 20 May 2026 16:02:17 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-cisco-nexus-bgp-dos/</guid><description>CVE-2026-20171 describes a vulnerability in the Border Gateway Protocol (BGP) enforce-first-as feature of Cisco Nexus 3000 and 9000 Series Switches that could allow an unauthenticated, remote attacker to trigger BGP peer flaps, resulting in a denial-of-service (DoS) condition.</description><content:encoded><![CDATA[<p>A vulnerability exists in the Border Gateway Protocol (BGP) enforce-first-as feature of Cisco Nexus 3000 Series Switches and Cisco Nexus 9000 Series Switches when operating in standalone NX-OS mode. Successful exploitation of this vulnerability could lead to a denial-of-service (DoS) condition. The vulnerability stems from the incorrect parsing of a transitive BGP attribute. Cisco has released software updates and workarounds to address this vulnerability.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated, remote attacker establishes a BGP peer session with a vulnerable Cisco Nexus switch.</li>
<li>The attacker crafts a malicious BGP update containing a malformed transitive BGP attribute.</li>
<li>The attacker sends the crafted BGP update to the targeted Cisco Nexus switch via the established BGP peer session.</li>
<li>The vulnerable switch attempts to parse the malformed transitive BGP attribute within the update.</li>
<li>Due to the incorrect parsing logic, the device experiences an error condition.</li>
<li>The device drops the BGP session with the peer that forwarded the update.</li>
<li>The BGP session repeatedly flaps (goes up and down) with the peer.</li>
<li>Continuous BGP session flapping results in a denial-of-service condition, disrupting network routing and connectivity.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-20171 results in a denial-of-service condition, impacting the availability of network services. The affected Cisco Nexus switches, if exploited, will drop BGP sessions and flap with neighboring BGP peers, causing routing instability. This can lead to network outages and service disruptions.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the software updates released by Cisco to address CVE-2026-20171 on all affected Cisco Nexus 3000 Series and 9000 Series Switches to remediate the vulnerability.</li>
<li>Implement the workarounds provided by Cisco as a temporary mitigation measure if immediate patching is not feasible.</li>
<li>Monitor network traffic for unusual BGP update patterns that may indicate exploitation attempts, triggering the rules below to detect potential exploitation.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>bgp</category><category>dos</category><category>cisco</category><category>network</category></item></channel></rss>