Cisco released patches for a DoS vulnerability (CVE-2026-20188) in its Crosswork Network Controller and NSO, allowing unauthenticated attackers to crash systems by exhausting connection resources.
This flaw is critical because it requires a manual system reboot for recovery, highlighting the operational disruption and potential downtime businesses could face if exploited.
Although not actively exploited yet, the history of similar Cisco DoS vulnerabilities being leveraged suggests that organizations should prioritize immediate software upgrades to prevent future attacks.

Atlas AI
Cisco has issued security updates for a denial-of-service (DoS) vulnerability affecting its Crosswork Network Controller (CNC) and Network Services Orchestrator (NSO) platforms.
Tracked as CVE-2026-20188, the issue can be exploited remotely by an unauthenticated attacker to exhaust available connection resources and cause affected systems to become unresponsive.
Cisco said the flaw is caused by insufficient rate limiting on incoming network connections. If successfully exploited, recovery requires a manual reboot of the impacted system.
The company is urging customers to upgrade to fixed sosourcesware versions. Cisco’s Product Security Incident Response Team (PSIRT) said it is not aware of active exploitation.
Cisco also noted that other DoS issues in its products have been exploited in the past, in some cases requiring manual intervention to restore services.


