CVE-2025-20241

7.4 HIGH

📋 TL;DR

An unauthenticated attacker on the same Layer 2 network can send a specially crafted IS-IS packet to vulnerable Cisco Nexus switches, causing the IS-IS routing process to restart and potentially triggering a full device reload. This results in a denial of service condition affecting network availability. Only Cisco Nexus 3000 and 9000 Series switches running standalone NX-OS with IS-IS enabled are vulnerable.

💻 Affected Systems

Products:
  • Cisco Nexus 3000 Series Switches
  • Cisco Nexus 9000 Series Switches
Versions: All versions prior to the fixed releases specified in the Cisco advisory
Operating Systems: Cisco NX-OS Software
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when IS-IS routing protocol is enabled and configured on the device. Devices in standalone NX-OS mode only (not ACI mode).

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device reload causing extended network outage, routing protocol reconvergence, and potential cascading failures in the network infrastructure.

🟠

Likely Case

IS-IS process restart causing temporary routing instability and brief network disruption until the process recovers or the device reloads.

🟢

If Mitigated

Minimal impact if IS-IS is disabled on vulnerable devices or if proper network segmentation prevents Layer 2 adjacency to attackers.

🌐 Internet-Facing: LOW - Requires Layer 2 adjacency, making internet exploitation extremely unlikely unless misconfigured.
🏢 Internal Only: HIGH - Internal attackers with Layer 2 access to vulnerable switches can cause significant disruption to critical network infrastructure.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires Layer 2 adjacency to the target device and knowledge of IS-IS protocol packet crafting. No authentication required.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to Cisco Security Advisory for specific fixed releases per platform

Vendor Advisory: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-n39k-isis-dos-JhJA8Rfx

Restart Required: Yes

Instructions:

1. Review Cisco Security Advisory for specific fixed releases. 2. Download appropriate software from Cisco.com. 3. Schedule maintenance window. 4. Upgrade NX-OS software following Cisco's upgrade procedures. 5. Verify IS-IS functionality post-upgrade.

🔧 Temporary Workarounds

Disable IS-IS Protocol

all

If IS-IS is not required for network operations, disable it on vulnerable devices

configure terminal
no router isis
end
copy running-config startup-config

Implement Network Segmentation

all

Restrict Layer 2 access to IS-IS enabled interfaces using VLANs, ACLs, or private VLANs

configure terminal
interface ethernet X/Y
switchport mode access
switchport access vlan Z
end
copy running-config startup-config

🧯 If You Can't Patch

  • Implement strict Layer 2 security controls to prevent unauthorized devices from becoming adjacent to vulnerable switches
  • Monitor IS-IS process health and device reloads, and establish rapid response procedures for potential DoS incidents

🔍 How to Verify

Check if Vulnerable:

Check if device is Cisco Nexus 3000/9000 Series running standalone NX-OS with IS-IS enabled using 'show version' and 'show running-config | include router isis'

Check Version:

show version | include Software

Verify Fix Applied:

Verify NX-OS version is at or above the fixed release specified in Cisco advisory using 'show version'

📡 Detection & Monitoring

Log Indicators:

  • IS-IS process restart messages
  • Unexpected device reloads
  • IS-IS adjacency flapping
  • System log messages indicating process crashes

Network Indicators:

  • Unusual IS-IS traffic patterns
  • Crafted IS-IS packets from unexpected sources
  • Routing instability in IS-IS domains

SIEM Query:

source="nxos_logs" AND ("IS-IS" AND (restart OR crash OR reload)) OR ("%SYSTEM" AND "reload")

🔗 References

📤 Share & Export