SCP Server DoS via Malformed SSH on Cisco IOS XE
CVE-2026-20083 Published on March 25, 2026

A vulnerability in the Secure Copy Protocol (SCP) server feature of Cisco IOS XE Software could allow an authenticated, local attacker with low privileges to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper handling of a malformed SCP request. An attacker could exploit this vulnerability by issuing a crafted command through SSH. A successful exploit could allow the attacker to cause the device to reload unexpectedly, resulting in a DoS condition.

NVD

Vulnerability Analysis

CVE-2026-20083 can be exploited with local system access, and requires small amount of user privileges. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have no impact on confidentiality and integrity, and a high impact on availability.

Attack Vector:
LOCAL
Attack Complexity:
LOW
Privileges Required:
LOW
User Interaction:
NONE
Scope:
CHANGED
Confidentiality Impact:
NONE
Integrity Impact:
NONE
Availability Impact:
HIGH

Weakness Type

Improper Handling of Extra Parameters

The software does not handle or incorrectly handles when the number of parameters, fields, or arguments with the same name exceeds the expected amount.


Products Associated with CVE-2026-20083

Want to know whenever a new CVE is published for Cisco IOS XE? stack.watch will email you.

 

Affected Versions

Cisco IOS XE Software: