Cisco launched security updates to repair a Crosswork Community Controller (CNC) and Community Providers Orchestrator (NSO) denial-of-service (DoS) vulnerability that requires manually rebooting focused methods for restoration.
Giant enterprises and repair suppliers leverage the CNC software program suite to simplify multivendor community administration and operations dealing with with automation, whereas the NSO orchestration platform helps them handle community units and assets.
Tracked as CVE-2026-20188, this high-severity security flaw stems from insufficient fee limiting on incoming community connections and might be exploited remotely by unauthenticated menace actors to crash unpatched Cisco CNC and Cisco NSO methods by means of low-complexity assaults.
“A profitable exploit may permit the attacker to exhaust out there connection assets, inflicting Cisco CNC and Cisco NSO to develop into unresponsive and leading to a DoS situation for respectable customers and dependent companies. A handbook reboot of the system is required to recuperate from this situation,” Cisco defined in a Wednesday advisory.
“To completely remediate this vulnerability and keep away from future publicity as described on this advisory, Cisco strongly recommends that clients improve to the mounted software program indicated on this advisory.”
Whereas CVE-2026-20188 might be abused to completely crash focused methods till handbook intervention, Cisco’s Product Safety Incident Response Group (PSIRT) just isn’t conscious of ongoing exploitation.
| Cisco CNC Launch | First Fastened Launch |
|---|---|
| 7.1 and earlier | Migrate to a set launch. |
| 7.2 | Not susceptible. |
| Cisco NSO Launch | First Fastened Launch |
|---|---|
| 6.3 and earlier | Migrate to a set launch. |
| 6.4 | 6.4.1.3 |
| 6.5 | Not susceptible. |
CVE-2026-20188 has not been exploited within the wild but, however Cisco has beforehand patched different DoS vulnerabilities that have been exploited in assaults.
For example, in November 2025, it warned that two security flaws (CVE-2025-20362 and CVE-2025-20333) beforehand exploited in zero-day assaults have been now getting used to drive ASA and FTD firewalls into reboot loops.
In September, when Cisco patched the 2 vulnerabilities, CISA issued an emergency directive ordering federal businesses to safe their Cisco firewalls in opposition to assaults utilizing this exploit chain inside 24 hours.
Cisco additionally addressed vulnerabilities (CVE-2022-20653 and CVE-2024-20401) that would permit attackers to completely crash Safe E mail home equipment utilizing maliciously crafted e mail messages.
The corporate suggested clients on the time to contact its Technical Help Middle (TAC) to have them introduced again on-line, as this required handbook intervention.
Final yr, Cisco patched one other DoS vulnerability (CVE-2025-20115) that allowed attackers to crash the Border Gateway Protocol (BGP) course of on IOS XR routers with a single BGP replace message.

AI chained 4 zero-days into one exploit that bypassed each renderer and OS sandboxes. A wave of latest exploits is coming.
On the Autonomous Validation Summit (Might 12 & 14), see how autonomous, context-rich validation finds what’s exploitable, proves controls maintain, and closes the remediation loop.
Declare Your Spot



