The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2020-10136

CVE-2020-10136: Cisco NX-OS Auth Bypass Vulnerability

CVE-2020-10136 is an authentication bypass flaw in Cisco NX-OS affecting IP-in-IP protocol decapsulation. Attackers can exploit this to bypass access controls. This article covers technical details, impact, and mitigation.

Published: March 4, 2026

CVE-2020-10136 Overview

CVE-2020-10136 is a protocol-level vulnerability affecting the IP-in-IP encapsulation mechanism as defined in RFC 2003. The vulnerability exists in devices that decapsulate and route IP-in-IP traffic without performing adequate validation on the encapsulated packets. This design flaw enables attackers to leverage network tunneling to bypass access controls, spoof source IP addresses, and cause unexpected routing behavior across enterprise network infrastructure.

The vulnerability is particularly significant because it affects fundamental network infrastructure components including Cisco Nexus switches, UCS systems, and products from multiple vendors implementing the Treck TCP/IP stack. Remote attackers with network access can craft malicious IP-in-IP packets to exploit vulnerable devices without authentication.

Critical Impact

Remote attackers can bypass network access controls, spoof IP addresses, and cause denial of service conditions on affected network infrastructure devices without authentication.

Affected Products

  • Cisco NX-OS (multiple versions across 5.x, 6.x, and 7.x branches)
  • Cisco Nexus 1000V, 1000VE, 3000, 5000, 6000, 7000, and 9000 Series Switches
  • Cisco UCS Manager and UCS 6200/6300 Series Fabric Interconnects
  • Cisco Unified Computing System
  • Digi Saros
  • HP X3220NR Firmware
  • Treck TCP/IP Stack

Discovery Timeline

  • June 2, 2020 - CVE-2020-10136 published to NVD
  • November 3, 2025 - Last updated in NVD database

Technical Details for CVE-2020-10136

Vulnerability Analysis

This vulnerability stems from a fundamental weakness in the IP-in-IP protocol implementation where devices fail to validate the authenticity and source of encapsulated packets before processing them. The IP-in-IP protocol (RFC 2003) allows IPv4 packets to be encapsulated within other IPv4 packets, creating tunnels for routing traffic across networks.

When a vulnerable device receives an IP-in-IP packet, it decapsulates the inner packet and routes it according to the inner packet's destination address. The flaw lies in the lack of verification that the outer packet originated from a legitimate tunnel endpoint. This allows attackers to inject packets that appear to originate from trusted internal sources after decapsulation.

The attack can be leveraged in several ways: bypassing source-based access control lists that inspect only the inner packet headers, spoofing the source of traffic to appear as if it originates from within the network, and routing traffic to unexpected destinations by manipulating how packets traverse network boundaries.

Root Cause

The root cause is classified under CWE-290 (Authentication Bypass by Spoofing). The IP-in-IP protocol specification in RFC 2003 does not mandate validation mechanisms to verify that encapsulated packets originate from authorized tunnel endpoints. Devices implementing this specification without additional source verification inherit this design weakness, allowing unauthenticated remote attackers to inject arbitrary encapsulated traffic.

Affected devices accept IP-in-IP packets from any source and process the encapsulated payload without confirming the legitimacy of the tunnel relationship. This architectural gap enables attackers to construct packets that bypass perimeter defenses and access controls designed to filter traffic based on source addresses.

Attack Vector

An attacker with network access can exploit this vulnerability by sending specially crafted IP-in-IP encapsulated packets to a vulnerable device. The attack does not require authentication or user interaction, making it exploitable remotely across network boundaries.

The attack flow involves the attacker constructing an IP-in-IP packet where the outer header contains a valid destination (the vulnerable device) and the inner header contains a spoofed source address (appearing to be from a trusted internal host). When the vulnerable device decapsulates this packet, it processes and routes the inner packet as if it legitimately originated from the spoofed source. This can be used to bypass firewall rules, access-control lists, or intrusion detection systems that trust traffic from specific source ranges.

Detection Methods for CVE-2020-10136

Indicators of Compromise

  • Unexpected IP-in-IP (protocol 4) traffic arriving from external network segments
  • Traffic patterns showing internal source addresses originating from external interfaces
  • Access control list violations that correlate with encapsulated traffic flows
  • Anomalous routing behavior or traffic appearing on unexpected network segments

Detection Strategies

  • Implement deep packet inspection rules to analyze IP-in-IP encapsulated traffic and validate source consistency between outer and inner headers
  • Configure network monitoring to alert on IP protocol 4 (IP-in-IP) traffic from unexpected sources or interfaces
  • Deploy intrusion detection signatures that identify IP-in-IP packets with mismatched or suspicious source address combinations
  • Monitor for access control bypass patterns where blocked sources appear to circumvent filtering rules

Monitoring Recommendations

  • Enable logging for IP-in-IP protocol traffic at network boundaries and critical infrastructure devices
  • Configure SIEM rules to correlate decapsulated traffic with source validation failures
  • Implement NetFlow or sFlow analysis to track IP-in-IP tunnel usage and identify unauthorized tunnel endpoints
  • Review network device logs for evidence of spoofed traffic or unexpected decapsulation events

How to Mitigate CVE-2020-10136

Immediate Actions Required

  • Apply vendor-provided firmware updates addressing CVE-2020-10136 on all affected Cisco NX-OS devices
  • Review and harden access control lists to filter IP-in-IP traffic at network boundaries
  • Disable IP-in-IP decapsulation on devices where this feature is not operationally required
  • Implement strict source validation for any legitimate IP-in-IP tunnels in use

Patch Information

Cisco has released security updates addressing this vulnerability in NX-OS. Organizations should consult the Cisco Security Advisory for specific fixed software versions and upgrade guidance. For devices using the Treck TCP/IP stack, contact the respective vendor for patching information. HP and Digi customers should reference their vendor's security resources for applicable updates.

The CERT Coordination Center has published vulnerability notes VU#636397 and VU#199397 providing additional guidance on affected products and mitigations.

Workarounds

  • Configure infrastructure access control lists (iACLs) to drop IP-in-IP packets (IP protocol 4) at network ingress points where tunneling is not required
  • Implement strict reverse path forwarding (uRPF) checks to validate source addresses of decapsulated packets
  • Segment network infrastructure to limit the exposure of devices that must support IP-in-IP functionality
  • Deploy network-based intrusion prevention systems with signatures to block malicious IP-in-IP exploitation attempts
bash
# Example Cisco NX-OS ACL to block IP-in-IP at perimeter
# Apply to ingress interfaces facing untrusted networks
ip access-list BLOCK-IPIP-INGRESS
  10 deny 4 any any log
  20 permit ip any any

interface Ethernet1/1
  ip access-group BLOCK-IPIP-INGRESS in

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeAuth Bypass

  • Vendor/TechCisco Nx Os

  • SeverityMEDIUM

  • CVSS Score5.3

  • EPSS Probability15.26%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityLow
  • CWE References
  • CWE-290
  • Technical References
  • RFC 6169 Specification

  • CERT Vulnerability Advisory #636397

  • Digi Security Resources

  • CERT Vulnerability Advisory #636397

  • CERT Vulnerability Advisory #199397
  • Vendor Resources
  • Cisco Security Advisory
  • Related CVEs
  • CVE-2024-20291: Cisco NX-OS ACL Bypass Vulnerability

  • CVE-2024-20397: Cisco NX-OS Auth Bypass Vulnerability

  • CVE-2024-20399: Cisco NX-OS Software RCE Vulnerability

  • CVE-2021-1587: Cisco NX-OS VXLAN OAM DoS Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English