Home

Description

A vulnerability in the web-based management interface of Cisco IoT Field Network Director could allow an authenticated, remote attacker with low privileges to cause a DoS condition on a remotely managed router. This vulnerability is due to improper error handling. An attacker could exploit this vulnerability by submitting crafted input to the web-based management interface. A successful exploit could allow the attacker to request unauthorized files from a remote router, causing the router to reload and resulting in a DoS condition.

PUBLISHED Reserved 2025-10-08 | Published 2026-05-06 | Updated 2026-05-06 | Assigner cisco




HIGH: 7.7CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H

Problem types

Improper Access Control

Product status

Default status
unknown

4.5.1
affected

4.4.3
affected

4.1.0
affected

4.1.3
affected

4.6.1
affected

4.1.1
affected

4.4.0
affected

4.2.0
affected

4.4.2
affected

4.3.0
affected

4.6.0
affected

4.4.4
affected

4.3.2
affected

4.1.2
affected

4.4.1
affected

4.5.0
affected

4.3.1
affected

4.7.0
affected

4.6.2
affected

4.7.1
affected

4.7.2
affected

4.8.0
affected

4.8.1
affected

4.9.0
affected

4.9.1
affected

4.10.0
affected

4.9.2
affected

4.11.0
affected

4.12.0
affected

4.12.1
affected

References

sec.cloudapps.cisco.com/...ory/cisco-sa-iot-fnd-dos-n8N26Q4u (cisco-sa-iot-fnd-dos-n8N26Q4u)

cve.org (CVE-2026-20167)

nvd.nist.gov (CVE-2026-20167)

Download JSON