Description

A vulnerability in the Protocol Independent Multicast Version 6 (PIM6) feature of Cisco Nexus 3000 Series Switches and Cisco Nexus 9000 Series Switches in standalone NX-OS mode could allow an authenticated, low-privileged, remote attacker to trigger a crash of the PIM6 process, resulting in a denial of service (DoS) condition. This vulnerability is due to improper processing of PIM6 ephemeral data queries. An attacker could exploit this vulnerability by sending a crafted ephemeral query to an affected device through one of the following methods: NX-API REST, NETCONF, RESTConf, gRPC, or Model Driven Telemetry. A successful exploit could allow the attacker to cause the PIM6 process to crash and restart, causing potential adjacency flaps and resulting in a DoS of the PIM6 and ephemeral query processes.

INFO

Published Date :

2025-08-27T16:23:46.232Z

Last Modified :

2025-08-27T18:19:53.930Z

Source :

cisco
AFFECTED PRODUCTS

The following products are affected by CVE-2025-20262 vulnerability.

Vendors Products
Cisco
  • Nexus
  • Nexus 3000
  • Nexus 9000
  • Nx-os
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2025-20262.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact