Home

Description

A vulnerability in the connection-handling mechanism of Cisco Crosswork Network Controller (CNC) and Cisco Network Services Orchestrator (NSO) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected system. This vulnerability is due to an inadequate implementation of rate-limiting on incoming network connections. An attacker could exploit this vulnerability by sending a large number of connection requests to an affected system. A successful exploit could allow the attacker to exhaust available connection resources, causing Cisco CNC and Cisco NSO to become unresponsive and resulting in a DoS condition for legitimate users and dependent services. A manual reboot of the system is required to recover from this condition.

PUBLISHED Reserved 2025-10-08 | Published 2026-05-06 | Updated 2026-05-06 | Assigner cisco




HIGH: 7.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Problem types

Uncontrolled Resource Consumption

Product status

Default status
unknown

3.0.0
affected

1.0.0
affected

2.0.2
affected

4.0.0
affected

4.1.0
affected

4.5.0
affected

5.0.0
affected

4.5.1
affected

4.5.2
affected

5.0.2
affected

4.1.3
affected

6.0.0
affected

7.0.0
affected

4.1.4
affected

5.0.4
affected

7.1.0
affected

7.0.3
affected

7.1.3
affected

Default status
unknown

5.7
affected

5.7.1
affected

5.7.1.1
affected

5.7.2
affected

5.7.2.1
affected

5.7.3
affected

5.8
affected

5.6.6.1
affected

5.7.5.1
affected

5.6.7.1
affected

5.6.7
affected

5.8.1
affected

5.6.6
affected

5.8.2.1
affected

5.7.5
affected

5.7.4
affected

5.8.2
affected

5.6.7.2
affected

5.7.6
affected

5.7.6.1
affected

5.8.3
affected

5.6.8
affected

5.7.6.2
affected

5.8.4
affected

5.7.7
affected

5.6.9
affected

5.6.8.1
affected

5.8.5
affected

5.7.8
affected

6.0
affected

5.7.8.1
affected

6.0.1
affected

5.6.10
affected

5.8.6
affected

6.0.1.1
affected

6.0.2
affected

5.7.9
affected

5.6.11
affected

5.8.7
affected

6.0.3
affected

5.7.10
affected

5.6.12
affected

5.8.8
affected

6.0.4
affected

5.7.10.1
affected

6.1
affected

5.7.6.3
affected

5.7.11
affected

6.0.5
affected

5.6.13
affected

5.8.9
affected

6.1.1
affected

5.7.10.2
affected

6.0.6
affected

5.7.12
affected

5.6.14
affected

5.8.10
affected

6.0.7
affected

5.7.13
affected

5.8.11
affected

6.0.8
affected

5.6.14.1
affected

5.8.12
affected

6.0.9
affected

5.8.13
affected

5.7.14
affected

6.0.10
affected

6.0.11
affected

5.7.15
affected

6.0.12
affected

5.7.9.1
affected

5.7.15.1
affected

6.0.13
affected

5.6.14.3
affected

5.8.13.1
affected

5.7.16
affected

5.7.17
affected

5.7.17.1
affected

5.7.18
affected

5.7.19
affected

5.7.19.1
affected

References

sec.cloudapps.cisco.com/...yAdvisory/cisco-sa-nso-dos-7Egqyc (cisco-sa-nso-dos-7Egqyc)

cve.org (CVE-2026-20188)

nvd.nist.gov (CVE-2026-20188)

Download JSON