Cisco Systems released a security advisory about a critical denial-of-service vulnerability in the Nexus 3000 and 9000 Series Switches using NX-OS software. The flaw, identified as CVE-2025-20241 and rated 7.4 on the CVSS scale, can let an unauthenticated nearby attacker interrupt essential network services.
Cisco explains that “a vulnerability in the Intermediate System-to-Intermediate System (IS-IS) feature of Cisco NX-OS Software… could allow an unauthenticated, adjacent attacker to cause the IS-IS process to unexpectedly restart, which could cause an affected device to reload.”
By infosecbulletin
/ Friday , August 29 2025
The Hikvision Security Response Center issued advisory revealing three critical vulnerabilities in HikCentral products. CVE identifiers CVE-2025-39245, CVE-2025-39246, and CVE-2025-39247...
Read More
By infosecbulletin
/ Friday , August 29 2025
The China-linked APT group Salt Typhoon is still attacking networks globally, focusing on telecommunications, government, transportation, hospitality, and military sectors....
Read More
By infosecbulletin
/ Thursday , August 28 2025
Storm-0501 has erased data and backups after stealing information from a victim's Microsoft Azure environment in a new cloud based...
Read More
By infosecbulletin
/ Thursday , August 28 2025
It is no secret that passwords are highly susceptible to phishing and brute force attacks. This led to the mass...
Read More
By infosecbulletin
/ Thursday , August 28 2025
Cisco Systems released a security advisory about a critical denial-of-service vulnerability in the Nexus 3000 and 9000 Series Switches using...
Read More
By infosecbulletin
/ Thursday , August 28 2025
Malaysia is boosting its digital transformation by launching its first fully AI-powered banking service. This initiative, which comes just before...
Read More
By infosecbulletin
/ Thursday , August 28 2025
Research by Group-IB has linked cyber-attacks on government organizations in Central Asia and the Asia-Pacific to a threat group called...
Read More
By infosecbulletin
/ Wednesday , August 27 2025
Citrix has issued fixes for three security vulnerabilities in NetScaler ADC and NetScaler Gateway, one of which is currently being...
Read More
By infosecbulletin
/ Tuesday , August 26 2025
SIEM systems are essential for detecting suspicious activity in enterprise networks, enabling real-time responses to potential attacks. However, the Picus...
Read More
By infosecbulletin
/ Tuesday , August 26 2025
Docker has issued fixes for a critical security vulnerability in the Docker Desktop app for Windows and macOS that could...
Read More
Insufficient input validation when parsing IS-IS packets can lead to device crashes. Attackers can exploit this by sending a malicious packet, causing the IS-IS process to crash and resulting in a denial-of-service.
Exploitation is limited to attackers with Layer 2 adjacency to the targeted device. The advisory clarifies: “This vulnerability can only be exploited by an adjacent IS-IS peer in the UP state. If IS-IS authentication is enabled, the IS-IS peer would need to use a valid key to exploit this vulnerability.”
Administrators can check whether IS-IS is enabled by running:
show running-config | include isis
If configuration commands such as feature isis, router isis <name>, and ip router isis <name> appear, IS-IS is active. Similarly, the show isis adjacency command reveals active IS-IS peers.
The vulnerability affects:
Cisco Nexus 3000 Series Switches
Cisco Nexus 9000 Series Switches in standalone NX-OS mode
Only devices with the IS-IS routing protocol enabled are vulnerable.
Cisco has released free software updates to fix the flaw. Customers with service contracts can access these fixes through their usual update channels.
For organizations those who can’t upgrade right away, using strong keys for IS-IS authentication can lower the risk of attacks.
Malaysia Launches World’s First AI-powered Bank