CVE-2026-20080
Unknown Unknown - Not Provided
Denial of Service in Cisco IEC6400 SSH Service

Publication date: 2026-01-21

Last updated on: 2026-01-21

Assigner: Cisco Systems, Inc.

Description
A vulnerability in the SSH service of Cisco IEC6400 Wireless Backhaul Edge Compute Software could allow an unauthenticated, remote attacker to cause the SSH service to stop responding. This vulnerability exists because the SSH service lacks effective flood protection. An attacker could exploit this vulnerability by initiating a denial of service (DoS) attack against the SSH port. A successful exploit could allow the attacker to cause the SSH service to be unresponsive during the period of the DoS attack. All other operations remain stable during the attack.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-21
Last Modified
2026-01-21
Generated
2026-05-07
AI Q&A
2026-01-21
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
cisco iec6400_wireless_backhaul_edge_compute_software 1.2.0
cisco iec6400_wireless_backhaul_edge_compute_software to 1.2.0 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-400 The product does not properly control the allocation and maintenance of a limited resource.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a medium-severity issue in the SSH service of Cisco IEC6400 Wireless Backhaul Edge Compute Software. It occurs because the SSH service lacks effective flood protection, allowing an unauthenticated, remote attacker to flood the SSH service and cause a denial of service (DoS). When exploited, the SSH service becomes unresponsive during the attack, although other device operations remain stable. It affects versions 1.1.0 and earlier with SSH enabled by default. [1]


How can this vulnerability impact me? :

The impact of this vulnerability is that an attacker can cause the SSH service on the affected device to stop responding by flooding it, resulting in a denial of service (DoS). This means you could lose remote SSH access to the device during the attack, potentially disrupting management or automation tasks that rely on SSH. However, other device operations will continue to function normally during the attack. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

There are no specific detection commands or methods provided for this vulnerability. However, monitoring for unusual SSH service unresponsiveness or high SSH port traffic indicative of a flood attack may help detect exploitation attempts. [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include disabling the SSH service if it is not required by using the CLI command `ssh-server disable` or through the web UI by unchecking the SSH option. This mitigation has been tested successfully but may impact network functionality. The recommended full remediation is to upgrade to Cisco IEC6400 Wireless Backhaul Edge Compute Software version 1.2.0, which contains the fix for this vulnerability. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart