### [CVE-2025-20262](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20262) ![](https://img.shields.io/static/v1?label=Product&message=Cisco%20NX-OS%20Software&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=10.1(1)%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=10.1(2)%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=10.1(2t)%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=10.2(1)%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=10.2(1q)%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=10.2(2)%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=10.2(2a)%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=10.2(3)%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=10.2(3t)%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=10.2(3v)%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=10.2(4)%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=10.2(5)%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=10.2(6)%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=10.2(7)%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=10.2(8)%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=10.3(1)%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=10.3(2)%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=10.3(3)%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=10.3(3o)%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=10.3(3p)%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=10.3(3q)%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=10.3(3r)%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=10.3(3w)%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=10.3(3x)%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=10.3(4)%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=10.3(4a)%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=10.3(4g)%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=10.3(4h)%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=10.3(5)%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=10.3(6)%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=10.3(99w)%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=10.3(99x)%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=10.4(1)%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=10.4(2)%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=10.4(3)%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=10.4(4)%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=10.4(4g)%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=10.5(1)%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=10.5(2)%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=9.2(1)%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=9.2(2)%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=9.2(2t)%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=9.2(2v)%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=9.2(3)%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=9.2(3y)%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=9.2(4)%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=9.3(1)%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=9.3(10)%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=9.3(11)%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=9.3(12)%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=9.3(13)%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=9.3(14)%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=9.3(1z)%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=9.3(2)%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=9.3(3)%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=9.3(4)%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=9.3(5)%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=9.3(5w)%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=9.3(6)%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=9.3(7)%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=9.3(7a)%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=9.3(7k)%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=9.3(8)%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=9.3(9)%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=NULL%20Pointer%20Dereference&color=brightgreen) ### Description A vulnerability in the Protocol Independent Multicast Version 6 (PIM6) feature of Cisco Nexus 3000 Series Switches and Cisco Nexus 9000 Series Switches in standalone NX-OS mode could allow an authenticated, low-privileged, remote attacker to trigger a crash of the PIM6 process, resulting in a denial of service (DoS) condition. This vulnerability is due to improper processing of PIM6 ephemeral data queries. An attacker could exploit this vulnerability by sending a crafted ephemeral query to an affected device through one of the following methods: NX-API REST, NETCONF, RESTConf, gRPC, or Model Driven Telemetry. A successful exploit could allow the attacker to cause the PIM6 process to crash and restart, causing potential adjacency flaps and resulting in a DoS of the PIM6 and ephemeral query processes. ### POC #### Reference No PoCs from references. #### Github - https://github.com/fkie-cad/nvd-json-data-feeds