RC RANDOM CHAOS

Cisco CNC/NSO flaw lets unauthenticated attackers wedge systems until manual reboot

· via BleepingComputer

Original source

New Cisco DoS flaw requires manual reboot to revive devices

BleepingComputer →

Cisco patched CVE-2026-20188, a high-severity DoS flaw in Crosswork Network Controller and Network Services Orchestrator caused by missing rate limiting on inbound connections. An unauthenticated remote attacker can exhaust connection resources with a low-complexity attack, leaving the platforms unresponsive to legitimate traffic and dependent services until an operator manually reboots the host. Software upgrades listed in the advisory are the only full fix.

The blast radius matters because CNC and NSO sit at the orchestration layer for large carrier and enterprise networks, so a wedged instance translates directly into stalled automation and change pipelines across multivendor estates. PSIRT has not seen exploitation in the wild yet, but Cisco’s recent track record — including the September 2025 ASA/FTD reboot-loop chain (CVE-2025-20362, CVE-2025-20333) that triggered a 24-hour CISA emergency directive, plus older Secure Email and IOS XR BGP crash bugs — shows attackers actively weaponize this class of flaw once disclosed.

Operators should prioritize patching, since the recovery path is human hands on the box rather than a graceful failover, and any exposed management plane is a single packet flood away from an outage.

Read the full article

Continue reading at BleepingComputer →

This is an AI-generated summary. Read the original for the full story.