{ "id": "CVE-2025-20111", "sourceIdentifier": "psirt@cisco.com", "published": "2025-02-26T17:15:22.240", "lastModified": "2025-02-26T17:15:22.240", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the health monitoring diagnostics of Cisco Nexus 3000 Series Switches and Cisco Nexus 9000 Series Switches in standalone NX-OS mode could allow an unauthenticated, adjacent attacker to cause the device to reload unexpectedly, resulting in a denial of service (DoS) condition.\r\n\r\nThis vulnerability is due to the incorrect handling of specific Ethernet frames. An attacker could exploit this vulnerability by sending a sustained rate of crafted Ethernet frames to an affected device. A successful exploit could allow the attacker to cause the device to reload." }, { "lang": "es", "value": "Una vulnerabilidad en los diagn\u00f3sticos de monitoreo de estado de los switches Cisco Nexus de la serie 3000 y Cisco Nexus de la serie 9000 en modo NX-OS independiente podr\u00eda permitir que un atacante adyacente no autenticado haga que el dispositivo se recargue inesperadamente, lo que da como resultado una condici\u00f3n de denegaci\u00f3n de servicio (DoS). Esta vulnerabilidad se debe a la gesti\u00f3n incorrecto de tramas Ethernet espec\u00edficas. Un atacante podr\u00eda explotar esta vulnerabilidad enviando una tasa sostenida de tramas Ethernet dise\u00f1adas a un dispositivo afectado. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante hacer que el dispositivo se recargue." } ], "metrics": { "cvssMetricV31": [ { "source": "psirt@cisco.com", "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "baseScore": 7.4, "baseSeverity": "HIGH", "attackVector": "ADJACENT_NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH" }, "exploitabilityScore": 2.8, "impactScore": 4.0 } ] }, "weaknesses": [ { "source": "psirt@cisco.com", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-1220" } ] } ], "references": [ { "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-n3kn9k-healthdos-eOqSWK4g", "source": "psirt@cisco.com" } ] }