Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNewsAbout
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
2712 articles · 132320 vulns · 35/41 feeds (7d)
← Back to list
7.5
CVE-2026-20188PATCHED
Cisco · Cisco Crosswork Network Change Automation

Cisco Crosswork Network Controller and Cisco Network Services Orchestrator Connection Exhaustion Denial of Service Vulnerability

Description

A vulnerability in the connection-handling mechanism of Cisco Crosswork Network Controller (CNC) and Cisco Network Services Orchestrator (NSO) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected system. This vulnerability is due to an inadequate implementation of rate-limiting on incoming network connections. An attacker could exploit this vulnerability by sending a large number of connection requests to an affected system. A successful exploit could allow the attacker to exhaust available connection resources, causing Cisco CNC and Cisco NSO to become unresponsive and resulting in a DoS condition for legitimate users and dependent services. A manual reboot of the system is required to recover from this condition.

Affected Products

VendorProductVersions
CiscoCisco Crosswork Network Change Automation3.0.0, 1.0.0, 2.0.2, 4.0.0, 4.1.0, 4.5.0, 5.0.0, 4.5.1, 4.5.2, 5.0.2, 4.1.3, 6.0.0, 7.0.0, 4.1.4, 5.0.4, 7.1.0, 7.0.3, 7.1.3, 5.7, 5.7.1, 5.7.1.1, 5.7.2, 5.7.2.1, 5.7.3, 5.8, 5.6.6.1, 5.7.5.1, 5.6.7.1, 5.6.7, 5.8.1, 5.6.6, 5.8.2.1, 5.7.5, 5.7.4, 5.8.2, 5.6.7.2, 5.7.6, 5.7.6.1, 5.8.3, 5.6.8, 5.7.6.2, 5.8.4, 5.7.7, 5.6.9, 5.6.8.1, 5.8.5, 5.7.8, 6.0, 5.7.8.1, 6.0.1, 5.6.10, 5.8.6, 6.0.1.1, 6.0.2, 5.7.9, 5.6.11, 5.8.7, 6.0.3, 5.7.10, 5.6.12, 5.8.8, 6.0.4, 5.7.10.1, 6.1, 5.7.6.3, 5.7.11, 6.0.5, 5.6.13, 5.8.9, 6.1.1, 5.7.10.2, 6.0.6, 5.7.12, 5.6.14, 5.8.10, 6.0.7, 5.7.13, 5.8.11, 6.0.8, 5.6.14.1, 5.8.12, 6.0.9, 5.8.13, 5.7.14, 6.0.10, 6.0.11, 5.7.15, 6.0.12, 5.7.9.1, 5.7.15.1, 6.0.13, 5.6.14.3, 5.8.13.1, 5.7.16, 5.7.17, 5.7.17.1, 5.7.18, 5.7.19, 5.7.19.1, 6.3, 6.4, 6.4.1.3, 6.5, 7.1

Also Affects

Downstream vendors/products affected by this vulnerability

VendorProductSourceConfidence
ciscisco network services orchestratormitre_affected90%

References

  • https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nso-dos-7Egqyc

Related News (2 articles)

Tier D
BleepingComputer5h ago
New Cisco DoS flaw requires manual reboot to revive devices
→ No new info (linked only)
Tier C
VulDB6h ago
CVE-2026-20188 | Cisco Crosswork Network Change Automation resource consumption (cisco-sa-nso-dos-7Egqyc)
→ No new info (linked only)
CVSS 3.17.5 HIGH
VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CISA KEV❌ No
Actively exploited❌ No
Patch available
7.2
CWECWE-400
PublishedMay 6, 2026
Last enriched4h agov2
Trending Score47
Source articles2
Independent2
Info Completeness9/14
Missing: epss, kev, exploit, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Related CVEs (5)

HIGHCVE-2026-20034
Cisco Unity Connection Remote Code Execution Vulnerability
Trending: 31
HIGHCVE-2026-20167
Cisco IoT Field Network Director Remote Device Denial of Service Vulnerability
Trending: 27
HIGHCVE-2026-20185
Cisco SG350 and SG350X Series Managed Switches SNMP Denial of Service Vunerability
Trending: 27
HIGHCVE-2026-20035
Cisco Unity Connection Server-Side Request Forgery Vulnerability
Trending: 27
MEDIUMCVE-2026-20168
Cisco IoT Field Network Director Path Traversal Vulnerability
Trending: 23

Pin to Dashboard

Verification

State: verified
Confidence: 0%

Vulnerability Timeline

CVE Published
May 6, 2026
Discovered by ZDM
May 6, 2026
Patch Available
May 6, 2026
Updated: affectedVersions, patchAvailable
May 6, 2026

Version History

v2
Last enriched 4h ago
v2Tier D4h ago

Updated description with more technical detail, added affected versions 6.3, 6.4, 6.4.1.3, 6.5, and specified patch available as version 7.2.

affectedVersionspatchAvailable
via BleepingComputer
v16h ago

Initial creation