Cisco’s Nexus Switch Fix: Bye-Bye Bugs or Just Another Glitch?
Cisco patched command injection and DoS vulnerabilities in Nexus switches, including a high-severity flaw. The most severe issue, CVE-2025-20111, affects the health monitoring diagnostics of Nexus 3000 and 9000 Series Switches in standalone NX-OS mode. An unauthenticated attacker could exploit it, leading to an unexpected device reload and denial of service.

Hot Take:
Another day, another vulnerability! Cisco’s Nexus switches might need a little more than a Band-Aid after these exposed flaws. Perhaps it’s time for these switches to switch their priorities from playing peek-a-boo with hackers to actually keeping them out. I can picture the denial-of-service flaw saying, “I just can’t handle all this pressure!”
Key Points:
- Cisco released patches for vulnerabilities in Nexus switches impacting the 3000 and 9000 series.
- The most severe flaw, CVE-2025-20111, has a CVSS score of 7.4 and can cause denial-of-service (DoS).
- The DoS vulnerability is due to incorrect handling of Ethernet frames.
- A command injection flaw, CVE-2025-20161, allows local attackers with admin credentials to execute arbitrary commands.
- No known attacks exploiting these vulnerabilities have been reported yet.
Already a member? Log in here