Cisco has issued critical security updates to address a vulnerability in its Switch Integrated Security Features (SISF), which affects several of its software platforms.
The flaw could let attackers on the same network segment send specially crafted DHCPv6 packets to force devices to reload, resulting in a denial of service (DoS) that interrupts network traffic and operations.
The vulnerability affects Cisco IOS, IOS XE, NX-OS, and Wireless LAN Controller (WLC) AireOS software. It stems from incorrect handling of DHCPv6 packets by the SISF component. If exploited, an attacker could crash the device remotely—without authentication—provided they are on a directly connected network.
This flaw is part of Cisco’s May 2025 semiannual bundled security advisory and is tracked under several IDs, including CSCwk04230 and CSCvq14413. Although the attack requires adjacency (local access), it poses a serious risk within internal networks or data center environments.
Who’s at Risk?
Affected devices include routers, switches, and controllers running vulnerable versions of IOS, IOS XE, NX-OS (Nexus 3000, 7000, 9000 in standalone mode), and AireOS. Notably, devices like Cisco Meraki, Firepower appliances, and Nexus 9000 in ACI mode are not affected.
Admins can use diagnostic commands to check if SISF is active:
- For IOS/IOS XE:
show device-tracking policies
orshow ipv6 snooping policies
- For AireOS:
show ipv6 summary
- For NX-OS:
show ipv6 snooping policies
No Workarounds – Immediate Patching Required
Cisco has confirmed there are no temporary fixes or workarounds. The only way to secure affected devices is to update to patched software versions.
WLC users should upgrade to version 8.10.196.0 or later. Updates are available through standard Cisco support channels and can also be requested via Cisco TAC even without a support contract, using the advisory as proof.
Cisco’s Product Security Incident Response Team (PSIRT) reports that this vulnerability was discovered internally through a TAC support case and has not been exploited in the wild.
However, given the potential for network disruption, Cisco strongly advises all administrators to patch affected systems as soon as possible.
Leave A Comment