Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Out-of-bounds access in CAPWAP daemon

    May 13, 2026

    West Pharmaceutical says hackers stole data, encrypted systems

    May 13, 2026

    Debian exim4 Important Remote Code Execution Denial of Service 6265-1

    May 13, 2026
    Facebook X (Twitter) Instagram
    • Demos
    • Technology
    • Gaming
    • Buy Now
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Canadian Cyber WatchCanadian Cyber Watch
    • Home
    • News
    • Alerts
    • Tips
    • Tools
    • Industry
    • Incidents
    • Events
    • Education
    Subscribe
    Canadian Cyber WatchCanadian Cyber Watch
    Home»News»New Cisco DoS flaw requires manual reboot to revive devices
    News

    New Cisco DoS flaw requires manual reboot to revive devices

    adminBy adminMay 6, 2026No Comments3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Cisco

    Cisco released security updates to fix a Crosswork Network Controller (CNC) and Network Services Orchestrator (NSO) denial-of-service (DoS) vulnerability that requires manually rebooting targeted systems for recovery.

    Large enterprises and service providers leverage the CNC software suite to simplify multivendor network management and operations handling with automation, while the NSO orchestration platform helps them manage network devices and resources.

    Tracked as CVE-2026-20188, this high-severity security flaw stems from inadequate rate limiting on incoming network connections and can be exploited remotely by unauthenticated threat actors to crash unpatched Cisco CNC and Cisco NSO systems through low-complexity attacks.

    “A successful exploit could allow the attacker to exhaust available connection resources, causing Cisco CNC and Cisco NSO to become unresponsive and resulting in a DoS condition for legitimate users and dependent services. A manual reboot of the system is required to recover from this condition,” Cisco explained in a Wednesday advisory.

    “To fully remediate this vulnerability and avoid future exposure as described in this advisory, Cisco strongly recommends that customers upgrade to the fixed software indicated in this advisory.”

    While CVE-2026-20188 can be abused to permanently crash targeted systems until manual intervention, Cisco’s Product Security Incident Response Team (PSIRT) is not aware of ongoing exploitation.




    Cisco CNC Release First Fixed Release
    7.1 and earlier Migrate to a fixed release.
    7.2 Not vulnerable.





    Cisco NSO Release First Fixed Release
    6.3 and earlier Migrate to a fixed release.
    6.4 6.4.1.3
    6.5 Not vulnerable.

    CVE-2026-20188 has not been exploited in the wild yet, but Cisco has previously patched other DoS vulnerabilities that were exploited in attacks.

    For instance, in November 2025, it warned that two security flaws (CVE-2025-20362 and CVE-2025-20333) previously exploited in zero-day attacks were now being used to force ASA and FTD firewalls into reboot loops.

    In September, when Cisco patched the two vulnerabilities, CISA issued an emergency directive ordering federal agencies to secure their Cisco firewalls against attacks using this exploit chain within 24 hours.

    Cisco also addressed vulnerabilities (CVE-2022-20653 and CVE-2024-20401) that could allow attackers to permanently crash Secure Email appliances using maliciously crafted email messages.

    The company advised customers at the time to contact its Technical Assistance Center (TAC) to have them brought back online, as this required manual intervention.

    Last year, Cisco patched another DoS vulnerability (CVE-2025-20115) that allowed attackers to crash the Border Gateway Protocol (BGP) process on IOS XR routers with a single BGP update message.


    article image

    AI chained four zero-days into one exploit that bypassed both renderer and OS sandboxes. A wave of new exploits is coming.

    At the Autonomous Validation Summit (May 12 & 14), see how autonomous, context-rich validation finds what’s exploitable, proves controls hold, and closes the remediation loop.

    Claim Your Spot



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleSamsung mobile security advisory (AV26-429)
    Next Article SSA-183963 V1.1 (Last Update: 2025-07-18): Certificate Validation Vulnerabilities in SICAM TOOLBOX II Before V07.11
    admin
    • Website

    Related Posts

    News

    West Pharmaceutical says hackers stole data, encrypted systems

    May 13, 2026
    News

    The Chinese Deepfake Software Powering Scams

    May 13, 2026
    News

    At Least We Know the Washington Post Isn’t Buying Views

    May 13, 2026
    Add A Comment

    Comments are closed.

    Demo
    Top Posts

    Catchy & Intriguing

    March 17, 202674 Views

    Defending Canada’s Digital Frontier: Combating Phishing, Social Engineering, Ransomware, and Malware

    March 23, 202624 Views

    IP Address Investigations and Local OSINT

    March 20, 202624 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews
    85
    Featured

    Pico 4 Review: Should You Actually Buy One Instead Of Quest 2?

    January 15, 2021 Featured
    8.1
    Uncategorized

    A Review of the Venus Optics Argus 18mm f/0.95 MFT APO Lens

    January 15, 2021 Uncategorized
    8.9
    Editor's Picks

    DJI Avata Review: Immersive FPV Flying For Drone Enthusiasts

    January 15, 2021 Editor's Picks

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Demo
    Most Popular

    Catchy & Intriguing

    March 17, 202674 Views

    Defending Canada’s Digital Frontier: Combating Phishing, Social Engineering, Ransomware, and Malware

    March 23, 202624 Views

    IP Address Investigations and Local OSINT

    March 20, 202624 Views
    Our Picks

    Out-of-bounds access in CAPWAP daemon

    May 13, 2026

    West Pharmaceutical says hackers stole data, encrypted systems

    May 13, 2026

    Debian exim4 Important Remote Code Execution Denial of Service 6265-1

    May 13, 2026

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • Home
    • Technology
    • Gaming
    • Phones
    • Buy Now
    © 2026 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.