Brief Summary: CVE-2026-20188 Connection Exhaustion DoS in Cisco Crosswork Network Controller and Network Services Orchestrator

A short review of CVE-2026-20188, a CVSS 7.5 denial of service vulnerability in Cisco Crosswork Network Controller and Cisco Network Services Orchestrator caused by missing connection rate limiting. Includes patch guidance and affected version details.

CVE Analysis

6 min read

ZeroPath CVE Analysis
ZeroPath CVE Analysis

2026-05-06

Brief Summary: CVE-2026-20188 Connection Exhaustion DoS in Cisco Crosswork Network Controller and Network Services Orchestrator
Experimental AI-Generated Content

This CVE analysis is an experimental publication that is completely AI-generated. The content may contain errors or inaccuracies and is subject to change as more information becomes available. We are continuously refining our process.

If you have feedback, questions, or notice any errors, please reach out to us.

[email protected]

Introduction

A missing rate limit in the connection handling mechanism of two of Cisco's core network automation platforms allows an unauthenticated remote attacker to completely exhaust connection resources, rendering the system unresponsive until a manual reboot is performed. For service providers and large enterprises that rely on Cisco Crosswork Network Controller (CNC) and Cisco Network Services Orchestrator (NSO) as the central orchestration layer for network service provisioning, this vulnerability (CVE-2026-20188, CVSS 7.5) represents a direct path to operational disruption across potentially thousands of managed devices.

Cisco Crosswork Network Controller is an SDN controller for IP Transport networks that simplifies operational workflows by consolidating service lifecycle and device management. Cisco Network Services Orchestrator is a multivendor, cross domain automation platform that bridges business intent to underlying physical and virtual infrastructure, supporting Cisco devices alongside over 1,000 third party device types. Together, these products form the backbone of automated network operations for many of the world's largest network operators.

Technical Information

The root cause of CVE-2026-20188 is classified under CWE-400 (Uncontrolled Resource Consumption). Specifically, the connection handling mechanism in both Cisco CNC and Cisco NSO does not adequately implement rate limiting on incoming network connections. The system will accept and attempt to process connection requests without enforcing a ceiling on concurrent or per interval connections, leaving the finite connection resource pool exposed to exhaustion.

The CVSS 3.1 vector string is CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H. Breaking this down:

  • Attack Vector: Network — the vulnerability is reachable over the network without any local access.
  • Attack Complexity: Low — no special conditions or preparation are needed.
  • Privileges Required: None — the attacker does not need any credentials.
  • User Interaction: None — no action from a legitimate user is required.
  • Impact: High Availability — the system becomes completely unresponsive, with no confidentiality or integrity impact.

Attack Flow

  1. The attacker identifies a network reachable instance of Cisco CNC or Cisco NSO running a vulnerable version.
  2. The attacker sends a large volume of connection requests to the target system. No authentication is required, and the requests do not need to be specially crafted beyond being valid connection attempts.
  3. Because no effective rate limiting is enforced, each incoming connection request consumes a portion of the system's finite connection resource pool.
  4. Once the connection resource pool is fully exhausted, the system can no longer accept new connections from any source, including legitimate administrators, API consumers, and dependent services.
  5. The system becomes completely unresponsive. Critically, it cannot recover automatically. A manual reboot is required to restore functionality.

This last point is particularly significant from an operational perspective. If out of band management access is not available, recovery may require physical intervention at the data center, extending the outage window considerably.

The vulnerability exists regardless of device configuration. There is no specific feature toggle, service enablement, or non default setting that must be active for the system to be vulnerable. Any deployment of the affected versions is exposed by default.

Scope of Impact

Because CNC and NSO serve as central orchestration points, a denial of service against these platforms does not merely affect a single device. It can halt service provisioning, configuration management, and lifecycle operations across the entire managed network domain. Dependent services that rely on API connectivity to CNC or NSO will also fail, creating cascading operational impact.

Patch Information

Cisco has released fixed software updates under advisory ID cisco-sa-nso-dos-7Egqyc (Bug ID: CSCwr08237). The patch introduces proper connection rate limiting to prevent remote unauthenticated attackers from exhausting connection resources. Cisco confirms there are no workarounds for this vulnerability; upgrading is the only remediation path.

Cisco Crosswork Network Controller (CNC)

CNC ReleaseFix Status
7.1 and earlierMust migrate to a fixed release
7.2Not vulnerable (target upgrade version)

For CNC users, the upgrade path is to move to CNC release 7.2, which was designed without the vulnerable connection handling logic.

Cisco Network Services Orchestrator (NSO)

NSO ReleaseFix Status
6.3 and earlierMust migrate to a fixed release
6.4Fixed in 6.4.1.3
6.5Not vulnerable

For NSO users on the 6.4 train, a targeted patch at 6.4.1.3 is available. Those on NSO 6.3 or earlier must perform a full version migration, as no backports are available for older release trains. NSO 6.5 ships without the vulnerability.

The scope of affected versions is extensive. The CVE record lists 18 affected CNC versions and 81 affected NSO versions spanning the 5.6.x through 6.0.x NSO release branches, underscoring how long the flawed connection handling code has been present in the codebase.

Given that successful exploitation renders the system completely unresponsive and requires a manual reboot to recover, organizations should also ensure that physical or out of band management access is available to perform emergency reboots if an attack occurs before patching is complete.

Affected Systems and Versions

Cisco Crosswork Network Controller:

  • All releases through version 7.1 are vulnerable (18 affected versions listed in the CVE record)
  • Version 7.2 is not vulnerable

Cisco Network Services Orchestrator:

  • All releases through version 6.3 are vulnerable
  • Version 6.4 (prior to 6.4.1.3) is vulnerable
  • Version 6.4.1.3 is the fixed release for the 6.4 train
  • Version 6.5 is not vulnerable
  • The CVE record lists 81 affected NSO versions spanning the 5.6.x through 6.0.x release branches

The vulnerability exists regardless of device configuration, meaning any deployment of the listed versions is affected by default.

Vendor Security History

Cisco maintains a dedicated Product Security Incident Response Team (PSIRT) that manages vulnerability disclosure and remediation guidance. The structured advisory format, inclusion of fixed release tables, and clear communication that no workarounds exist reflect an established incident response process. The advisory for CVE-2026-20188 was published on May 6, 2026, with fixed releases available at the time of disclosure.

References

Detect & fix
what others miss

Security magnifying glass visualization