Cisco has published a high-severity security advisory warning customers about a newly discovered flaw in its Nexus 3000 and 9000 Series switches running NX-OS.
The bug, tracked as CVE-2025-20241 with a CVSS score of 7.4 (High), could allow attackers to force switches offline by sending malicious IS-IS packets.
If left unpatched, this weakness could expose enterprise networks to denial-of-service (DoS) attacks, causing routing disruptions and downtime in critical environments.
What Is the Cisco Nexus IS-IS Vulnerability
The flaw exists in the Intermediate System-to-Intermediate System (IS-IS) feature of Cisco NX-OS.
-
Attackers must be on the same Layer 2 network segment as the target.
-
By sending a malformed IS-IS packet, they can crash the IS-IS process.
-
In some cases, this reloads the entire switch, disrupting routing and traffic forwarding.
Only devices with IS-IS enabled are affected.
Notably, Nexus 9000 in ACI mode, Cisco Firepower, MDS 9000, and UCS Fabric Interconnects are confirmed safe.
How to Check if Your Device Is Vulnerable
Administrators can verify IS-IS status on their devices using the following commands:
-
To check if IS-IS is enabled:
show running config | include isis
-
To view live IS-IS peers:
show isis neighbors
If you see feature isis, router isis name, or ip router isis name, your device is exposed.
What Makes This Flaw Dangerous
-
High Impact: A single crafted packet can trigger a reload.
-
No Workarounds: Cisco has confirmed there are no temporary fixes.
-
Widespread Exposure: Nexus switches are widely used in data centers, cloud, and enterprise networks.
The only mitigation available is enabling IS-IS authentication, which forces attackers to present valid credentials before sending malicious packets.
Cisco’s Official Fix
Cisco has already released free NX-OS software updates that patch the flaw.
-
Customers with valid service contracts should download updates directly from the Cisco Support portal.
-
Customers without a contract can still obtain the fix by contacting Cisco TAC with the advisory URL and device serial number.
Key Takeaways for Security Teams
-
Patch immediately – Apply Cisco’s NX-OS update as soon as possible.
-
Check exposure – Confirm if IS-IS is enabled and running.
-
Enable IS-IS authentication – As an added defense layer.
-
Monitor adjacent networks – Attacks require Layer 2 adjacency.
Why This Matters
Cisco Nexus switches sit at the heart of modern enterprises and data centers. A targeted DoS attack could result in service outages, revenue loss, and business disruption.
Security teams cannot afford to delay patching. With no workarounds available, updating devices is the only reliable defense.
Final Thoughts:
The CVE-2025-20241 flaw shows how even adjacent network-layer attacks can have massive consequences when aimed at critical infrastructure. Organizations relying on Cisco Nexus hardware must prioritize this update now to avoid being caught off guard.

















