CVE-2025-20262
BaseFortify
Publication date: 2025-08-27
Last updated on: 2025-08-29
Assigner: Cisco Systems, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| cisco | nexus_9000 | * |
| cisco | nexus_3000 | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-476 | The product dereferences a pointer that it expects to be valid but is NULL. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability affects the Protocol Independent Multicast Version 6 (PIM6) feature on Cisco Nexus 3000 and 9000 Series Switches running standalone NX-OS. It occurs because of improper processing of PIM6 ephemeral data queries. An authenticated, low-privileged remote attacker can send specially crafted ephemeral queries via interfaces like NX-API REST, NETCONF, RESTConf, gRPC, or Model Driven Telemetry to cause the PIM6 process to crash and restart. This leads to adjacency flaps and disruption of PIM6 and ephemeral query operations, resulting in a denial of service (DoS). [1]
How can this vulnerability impact me? :
Exploitation of this vulnerability can cause the PIM6 process on affected Cisco Nexus switches to crash and restart, leading to adjacency flaps and disruption of multicast routing and ephemeral query processes. This results in a denial of service (DoS) condition, potentially impacting network availability and stability for multicast traffic relying on PIM6. [1]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
You can detect if your device is potentially vulnerable by verifying if the PIM6 feature and any of the following features are enabled: NX-API, NETCONF, RESTCONF, gRPC, or Model Driven Telemetry. Use the CLI commands `show feature | include pim6` to check for PIM6 and `show feature | include <feature_name>` to check for the other features. If these features are enabled on Cisco Nexus 3000 or 9000 Series Switches in standalone NX-OS mode, the device may be vulnerable. [1]
What immediate steps should I take to mitigate this vulnerability?
The immediate mitigation step is to upgrade to the fixed software releases provided by Cisco as recommended in their security advisories. There are no workarounds available. Ensure hardware and software compatibility before upgrading. Use Cisco's Software Checker tool to identify vulnerable software versions and obtain the appropriate fixed releases. [1]