Cisco’s Nexus Fix: Patch Now or Risk the Switcheroo!
Cisco has patched a command injection and a DoS vulnerability in its Nexus switches, including CVE-2025-20111. Laughing at a denial-of-service condition? That’s easier than pronouncing “unauthenticated attacker.” But fear not, Nexus owners, your switches can now dodge Ethernet frames like a pro. Just remember, NX-OS mode isn’t invincible!

Hot Take:
Looks like Cisco’s having a bit of a rough patch… literally! Their Nexus switches got a software facelift, but not before leaving the door open for some unwanted guests. Maybe it’s time for these switches to take a vacation in the Bahamas – they could use the break!
Key Points:
- Cisco patched high-severity and medium-severity vulnerabilities in Nexus 3000 and 9000 series switches.
- The high-severity issue, CVE-2025-20111, is related to incorrect handling of Ethernet frames.
- The medium-severity flaw allows for command injection through admin credentials.
- Additional medium-severity vulnerabilities were found in Cisco’s Application Policy Infrastructure Controller (APIC).
- No active exploitation of these vulnerabilities has been reported yet, but Cisco’s track record suggests otherwise.
Already a member? Log in here