CVE-2026-20188 PUBLISHED

Cisco Crosswork Network Controller and Cisco Network Services Orchestrator Connection Exhaustion Denial of Service Vulnerability

Assigner: cisco
Reserved: 08.10.2025 Published: 06.05.2026 Updated: 06.05.2026

A vulnerability in the connection-handling mechanism of Cisco Crosswork Network Controller (CNC) and Cisco Network Services Orchestrator (NSO) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected system.

This vulnerability is due to an inadequate implementation of rate-limiting on incoming network connections. An attacker could exploit this vulnerability by sending a large number of connection requests to an affected system. A successful exploit could allow the attacker to exhaust available connection resources, causing Cisco CNC and Cisco NSO to become unresponsive and resulting in a DoS condition for legitimate users and dependent services. A manual reboot of the system is required to recover from this condition.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS Score: 7.5

Product Status

Vendor Cisco
Product Cisco Crosswork Network Change Automation
Versions Default: unknown
  • Version 3.0.0 is affected
  • Version 1.0.0 is affected
  • Version 2.0.2 is affected
  • Version 4.0.0 is affected
  • Version 4.1.0 is affected
  • Version 4.5.0 is affected
  • Version 5.0.0 is affected
  • Version 4.5.1 is affected
  • Version 4.5.2 is affected
  • Version 5.0.2 is affected
  • Version 4.1.3 is affected
  • Version 6.0.0 is affected
  • Version 7.0.0 is affected
  • Version 4.1.4 is affected
  • Version 5.0.4 is affected
  • Version 7.1.0 is affected
  • Version 7.0.3 is affected
  • Version 7.1.3 is affected
Vendor Cisco
Product Cisco Network Services Orchestrator
Versions Default: unknown
  • Version 5.7 is affected
  • Version 5.7.1 is affected
  • Version 5.7.1.1 is affected
  • Version 5.7.2 is affected
  • Version 5.7.2.1 is affected
  • Version 5.7.3 is affected
  • Version 5.8 is affected
  • Version 5.6.6.1 is affected
  • Version 5.7.5.1 is affected
  • Version 5.6.7.1 is affected
  • Version 5.6.7 is affected
  • Version 5.8.1 is affected
  • Version 5.6.6 is affected
  • Version 5.8.2.1 is affected
  • Version 5.7.5 is affected
  • Version 5.7.4 is affected
  • Version 5.8.2 is affected
  • Version 5.6.7.2 is affected
  • Version 5.7.6 is affected
  • Version 5.7.6.1 is affected
  • Version 5.8.3 is affected
  • Version 5.6.8 is affected
  • Version 5.7.6.2 is affected
  • Version 5.8.4 is affected
  • Version 5.7.7 is affected
  • Version 5.6.9 is affected
  • Version 5.6.8.1 is affected
  • Version 5.8.5 is affected
  • Version 5.7.8 is affected
  • Version 6.0 is affected
  • Version 5.7.8.1 is affected
  • Version 6.0.1 is affected
  • Version 5.6.10 is affected
  • Version 5.8.6 is affected
  • Version 6.0.1.1 is affected
  • Version 6.0.2 is affected
  • Version 5.7.9 is affected
  • Version 5.6.11 is affected
  • Version 5.8.7 is affected
  • Version 6.0.3 is affected
  • Version 5.7.10 is affected
  • Version 5.6.12 is affected
  • Version 5.8.8 is affected
  • Version 6.0.4 is affected
  • Version 5.7.10.1 is affected
  • Version 6.1 is affected
  • Version 5.7.6.3 is affected
  • Version 5.7.11 is affected
  • Version 6.0.5 is affected
  • Version 5.6.13 is affected
  • Version 5.8.9 is affected
  • Version 6.1.1 is affected
  • Version 5.7.10.2 is affected
  • Version 6.0.6 is affected
  • Version 5.7.12 is affected
  • Version 5.6.14 is affected
  • Version 5.8.10 is affected
  • Version 6.0.7 is affected
  • Version 5.7.13 is affected
  • Version 5.8.11 is affected
  • Version 6.0.8 is affected
  • Version 5.6.14.1 is affected
  • Version 5.8.12 is affected
  • Version 6.0.9 is affected
  • Version 5.8.13 is affected
  • Version 5.7.14 is affected
  • Version 6.0.10 is affected
  • Version 6.0.11 is affected
  • Version 5.7.15 is affected
  • Version 6.0.12 is affected
  • Version 5.7.9.1 is affected
  • Version 5.7.15.1 is affected
  • Version 6.0.13 is affected
  • Version 5.6.14.3 is affected
  • Version 5.8.13.1 is affected
  • Version 5.7.16 is affected
  • Version 5.7.17 is affected
  • Version 5.7.17.1 is affected
  • Version 5.7.18 is affected
  • Version 5.7.19 is affected
  • Version 5.7.19.1 is affected

Exploits

The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.

References

Problem Types

  • Uncontrolled Resource Consumption cwe