The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-20118

CVE-2026-20118: Cisco IOS XR Software DoS Vulnerability

CVE-2026-20118 is a denial of service vulnerability in Cisco IOS XR Software for NCS 5500/5700 Series that causes network processing units to stop processing traffic. This article covers technical details, affected systems, and mitigations.

Published: March 13, 2026

CVE-2026-20118 Overview

A vulnerability in the handling of an Egress Packet Network Interface (EPNI) Aligner interrupt in Cisco IOS XR Software could allow an unauthenticated, remote attacker to cause the network processing unit (NPU) and ASIC to stop processing, preventing traffic from traversing the interface. This vulnerability affects Cisco Network Convergence System (NCS) 5500 Series with NC57 line cards, Cisco NCS 5700 Routers, and Cisco IOS XR Software for Third Party Software.

The vulnerability is due to the corruption of packets in specific cases when an EPNI Aligner interrupt is triggered while an affected device is experiencing heavy transit traffic. An attacker could exploit this vulnerability by sending a continuous flow of crafted packets to an interface of the affected device. A successful exploit could allow the attacker to cause persistent, heavy packet loss, resulting in a denial of service (DoS) condition.

Critical Impact

Successful exploitation causes the NPU and ASIC to stop processing traffic, leading to persistent packet loss and service disruption on critical network infrastructure. Cisco has elevated this vulnerability's Security Impact Rating to High due to the affected devices operating within critical network segments.

Affected Products

  • Cisco IOS XR Software for Cisco Network Convergence System (NCS) 5500 Series with NC57 line cards
  • Cisco NCS 5700 Routers
  • Cisco IOS XR Software for Third Party Software

Discovery Timeline

  • 2026-03-11 - CVE CVE-2026-20118 published to NVD
  • 2026-03-12 - Last updated in NVD database

Technical Details for CVE-2026-20118

Vulnerability Analysis

This vulnerability resides in the interrupt handling mechanism of the Egress Packet Network Interface (EPNI) Aligner component within Cisco IOS XR Software. The EPNI Aligner is responsible for managing packet alignment during egress processing on network interfaces. When the device is under heavy transit traffic conditions and an EPNI Aligner interrupt is triggered, a race condition can occur that leads to packet corruption.

The vulnerability is classified under CWE-460 (Improper Cleanup on Thrown Exception), indicating that the interrupt handling routine fails to properly clean up or manage resources when the exception condition occurs during high-traffic scenarios. This improper cleanup leads to a cascading failure where the NPU and ASIC components cease packet processing operations.

Root Cause

The root cause of this vulnerability is improper cleanup on thrown exception (CWE-460) within the EPNI Aligner interrupt handling code. When an EPNI Aligner interrupt fires during periods of heavy traffic load, the exception handling mechanism fails to properly restore the system state or release resources. This results in packet corruption that propagates through the processing pipeline, ultimately causing the NPU and ASIC to enter a non-functional state where they cannot process network traffic.

Attack Vector

The attack vector is network-based and does not require authentication. An attacker can exploit this vulnerability remotely by:

  1. Identifying a target device running vulnerable Cisco IOS XR Software on NCS 5500 Series (with NC57 line cards) or NCS 5700 routers
  2. Generating and sending a continuous flow of specially crafted packets to an interface on the affected device
  3. Timing the attack to coincide with or create conditions of heavy transit traffic
  4. Triggering the EPNI Aligner interrupt handling flaw, causing packet corruption
  5. Achieving persistent packet loss and denial of service as the NPU and ASIC stop processing traffic

The attack requires high complexity as specific traffic conditions must be present for successful exploitation. The vulnerability has a changed scope, meaning the impact extends beyond the vulnerable component to affect other network segments that depend on the targeted infrastructure.

Detection Methods for CVE-2026-20118

Indicators of Compromise

  • Sudden and persistent packet loss on interfaces of affected NCS 5500 or NCS 5700 devices
  • NPU or ASIC hardware components showing error states or stopped processing in system logs
  • EPNI Aligner interrupt errors appearing in Cisco IOS XR system logs
  • Unexpected interface flapping or traffic blackholing during high traffic periods

Detection Strategies

  • Monitor for EPNI Aligner interrupt-related error messages in Cisco IOS XR system logs using syslog forwarding
  • Configure SNMP traps for NPU and ASIC health status changes on affected platforms
  • Implement network flow analysis to detect unusual packet loss patterns on critical interfaces
  • Deploy SentinelOne Singularity for network infrastructure monitoring to detect anomalous traffic patterns indicative of exploitation attempts

Monitoring Recommendations

  • Establish baseline metrics for normal traffic patterns and packet loss rates on affected devices
  • Configure alerting thresholds for packet loss exceeding normal operational parameters
  • Enable detailed hardware component logging on NCS 5500 and NCS 5700 platforms to capture EPNI Aligner events
  • Implement traffic analysis at network boundaries to identify potential attack traffic targeting affected infrastructure

How to Mitigate CVE-2026-20118

Immediate Actions Required

  • Review the Cisco Security Advisory for specific affected versions and available patches
  • If active exploitation is suspected, immediately contact Cisco Technical Assistance Center (TAC) or your contracted maintenance provider
  • Implement traffic filtering where possible to limit exposure of affected interfaces
  • Consider traffic engineering to reduce load on potentially affected devices until patches can be applied

Patch Information

Cisco has released security advisories and patches to address this vulnerability. Administrators should consult the Cisco Security Advisory for specific version information, fixed software releases, and upgrade paths for affected Cisco IOS XR Software deployments.

Organizations running Cisco NCS 5500 Series with NC57 line cards or NCS 5700 Routers should prioritize reviewing their software versions and planning upgrades to patched versions as soon as operationally feasible.

Workarounds

  • Contact Cisco TAC for device-specific workaround recommendations while awaiting patch deployment
  • Implement rate limiting on exposed interfaces to reduce the likelihood of triggering the vulnerability under heavy traffic conditions
  • Consider network segmentation to limit the attack surface of affected devices
  • Monitor the Cisco Security Advisory for any interim mitigation guidance specific to your deployment

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeDOS

  • Vendor/TechCisco Ios Xr

  • SeverityMEDIUM

  • CVSS Score6.8

  • EPSS Probability0.07%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H
  • Impact Assessment
  • ConfidentialityHigh
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-460
  • Technical References
  • Cisco Security Advisory
  • Related CVEs
  • CVE-2026-20074: Cisco IOS XR IS-IS DoS Vulnerability

  • CVE-2020-3566: Cisco IOS XR DVMRP DOS Vulnerability

  • CVE-2020-3569: Cisco IOS XR IGMP DoS Vulnerability

  • CVE-2025-20142: Cisco IOS XR DoS Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English