Instituto Nacional de ciberseguridad. Sección Incibe
Instituto Nacional de Ciberseguridad. Sección INCIBE-CERT

Vulnerabilidades

Con el objetivo de informar, advertir y ayudar a los profesionales sobre las ultimas vulnerabilidades de seguridad en sistemas tecnológicos, ponemos a disposición de los usuarios interesados en esta información una base de datos con información en castellano sobre cada una de las ultimas vulnerabilidades documentadas y conocidas.

Este repositorio con más de 75.000 registros esta basado en la información de NVD (National Vulnerability Database) – en función de un acuerdo de colaboración – por el cual desde INCIBE realizamos la traducción al castellano de la información incluida. En ocasiones este listado mostrará vulnerabilidades que aún no han sido traducidas debido a que se recogen en el transcurso del tiempo en el que el equipo de INCIBE realiza el proceso de traducción.

Se emplea el estándar de nomenclatura de vulnerabilidades CVE (Common Vulnerabilities and Exposures), con el fin de facilitar el intercambio de información entre diferentes bases de datos y herramientas. Cada una de las vulnerabilidades recogidas enlaza a diversas fuentes de información así como a parches disponibles o soluciones aportadas por los fabricantes y desarrolladores. Es posible realizar búsquedas avanzadas teniendo la opción de seleccionar diferentes criterios como el tipo de vulnerabilidad, fabricante, tipo de impacto entre otros, con el fin de acortar los resultados.

Mediante suscripción RSS o Boletines podemos estar informados diariamente de las ultimas vulnerabilidades incorporadas al repositorio.

CVE-2026-20099

Fecha de publicación:
25/02/2026
Idioma:
Inglés
*** Pendiente de traducción *** A vulnerability in the web-based management interface of Cisco FXOS Software and Cisco&amp;nbsp;UCS Manager Software could allow an authenticated, local attacker with administrative privileges to perform command injection attacks on an affected system and elevate privileges to&amp;nbsp;root.&amp;nbsp;<br /> <br /> This vulnerability is due to insufficient input validation of command arguments supplied by the user. An attacker could exploit this vulnerability by authenticating to a device and submitting crafted input to the affected command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system of the affected device with root-level privileges.
Gravedad CVSS v3.1: MEDIA
Última modificación:
25/02/2026

CVE-2026-20107

Fecha de publicación:
25/02/2026
Idioma:
Inglés
*** Pendiente de traducción *** A vulnerability in the Object Model CLI component of Cisco Application Policy Infrastructure Controller (APIC) could allow an authenticated, local attacker to cause an affected device to reload unexpectedly, resulting in a denial of service (DoS) condition. To exploit this vulnerability, the attacker must have valid user credentials and any role that includes CLI access.<br /> <br /> This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by issuing crafted commands at the CLI prompt. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.
Gravedad CVSS v3.1: MEDIA
Última modificación:
25/02/2026

CVE-2026-20051

Fecha de publicación:
25/02/2026
Idioma:
Inglés
*** Pendiente de traducción *** A vulnerability with the Ethernet VPN (EVPN) Layer 2 ingress packet processing of Cisco Nexus 3600 Platform Switches and Cisco Nexus 9500-R Series Switching Platforms could allow an unauthenticated, adjacent attacker to trigger a Layer 2 traffic loop.<br /> <br /> This vulnerability is due to a logic error when processing a crafted Layer 2 ingress frame. An attacker could exploit this vulnerability by sending a stream of crafted Ethernet frames through the targeted device. A successful exploit could allow the attacker to cause a Layer 2 Virtual eXtensible LAN (VxLAN) traffic loop, which, in turn, could result in a denial of service (DoS) condition. This Layer 2 loop could oversubscribe the bandwidth on network interfaces, which would result in all data plane traffic being dropped. To exploit this vulnerability, the attacker must be Layer 2-adjacent to the affected device.<br /> Note:&amp;nbsp;To stop active exploitation of this vulnerability, manual intervention is required to both stop the crafted traffic and flap all involved network interfaces. For additional assistance if a Layer 2 loop that is related to this vulnerability is suspected, contact the Cisco Technical Assistance Center (TAC) or the proper support provider.&amp;nbsp;
Gravedad CVSS v3.1: ALTA
Última modificación:
25/02/2026

CVE-2026-20091

Fecha de publicación:
25/02/2026
Idioma:
Inglés
*** Pendiente de traducción *** A vulnerability in the web-based management interface of Cisco FXOS Software and Cisco UCS Manager Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface.<br /> <br /> This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected system. An attacker could exploit this vulnerability by injecting malicious data into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability,&amp;nbsp;the attacker must have valid credentials for a user account with the role of Administrator or AAA Administrator.&amp;nbsp;
Gravedad CVSS v3.1: MEDIA
Última modificación:
25/02/2026

CVE-2026-20037

Fecha de publicación:
25/02/2026
Idioma:
Inglés
*** Pendiente de traducción *** A vulnerability in the NX-OS CLI privilege levels of Cisco UCS Manager Software could allow an authenticated, local attacker with read-only privileges to modify files and perform unauthorized actions on an affected system.<br /> &amp;nbsp;<br /> This vulnerability exists because unnecessary privileges are given to the user. An attacker could exploit this vulnerability by authenticating to a device as a read-only user and connecting to the NX-OS CLI. A successful exploit could allow the attacker to create or overwrite files in the file system or perform limited privileged actions on an affected device.&amp;nbsp; &amp;nbsp;
Gravedad CVSS v3.1: MEDIA
Última modificación:
25/02/2026

CVE-2026-20048

Fecha de publicación:
25/02/2026
Idioma:
Inglés
*** Pendiente de traducción *** A vulnerability in the Simple Network Management Protocol (SNMP) subsystem of Cisco Nexus 9000 Series Fabric Switches in ACI mode could allow an authenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.<br /> <br /> This vulnerability is due to improper processing when parsing SNMP requests. An attacker could exploit this vulnerability by continuously sending SNMP queries&amp;nbsp;to a specific MIB of an affected device. A successful exploit could allow the attacker to cause a kernel panic on the device, resulting in a reload and a&amp;nbsp;DoS condition.<br /> Note: This vulnerability affects SNMP versions 1, 2c, and 3. To exploit&amp;nbsp;this vulnerability through SNMPv1 or&amp;nbsp;SNMPv2c, the attacker must have a valid read-only SNMP community string for the affected system. To exploit this vulnerability through SNMPv3, the attacker must have valid SNMP user credentials for the affected system.
Gravedad CVSS v3.1: ALTA
Última modificación:
25/02/2026

CVE-2026-20010

Fecha de publicación:
25/02/2026
Idioma:
Inglés
*** Pendiente de traducción *** A vulnerability in the Link Layer Discovery Protocol (LLDP) feature of Cisco NX-OS Software could allow an unauthenticated, adjacent attacker to cause the LLDP process to restart, which could cause an affected device to reload unexpectedly.<br /> <br /> This vulnerability is due to improper handling of specific fields in an LLDP frame. An attacker could exploit this vulnerability by sending a crafted LLDP packet to an interface of an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a denial of service (DoS) condition.<br /> Note:&amp;nbsp;LLDP is a Layer 2 link protocol. To exploit this vulnerability, an attacker would need to be&amp;nbsp;directly connected to an interface of an affected device, either physically or logically (for example, through a Layer 2 Tunnel configured to transport the LLDP protocol).
Gravedad CVSS v3.1: ALTA
Última modificación:
25/02/2026

CVE-2026-20033

Fecha de publicación:
25/02/2026
Idioma:
Inglés
*** Pendiente de traducción *** A vulnerability in Cisco Nexus 9000 Series Fabric Switches in ACI mode could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device.<br /> <br /> This vulnerability is due to insufficient validation when processing specific Ethernet frames. An attacker could exploit this vulnerability by sending a crafted Ethernet frame to the&amp;nbsp;management interface of an affected device. A successful exploit could allow the attacker to cause the device to reload unexpectedly, resulting in a DoS condition.<br /> Note: Only the out-of-band (OOB) management interface is affected.
Gravedad CVSS v3.1: ALTA
Última modificación:
25/02/2026

CVE-2026-20036

Fecha de publicación:
25/02/2026
Idioma:
Inglés
*** Pendiente de traducción *** A vulnerability in the CLI and web-based management interface of Cisco UCS Manager Software could allow an authenticated, remote attacker with valid administrative privileges to execute arbitrary commands on the underlying operating system of an affected device.&amp;nbsp;<br /> &amp;nbsp;<br /> This vulnerability is due to insufficient input validation of command arguments that are supplied by the user. An attacker could exploit this vulnerability by authenticating to a device and submitting crafted input to the affected command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system of an affected device with root-level privileges.
Gravedad CVSS v3.1: MEDIA
Última modificación:
25/02/2026

CVE-2026-3188

Fecha de publicación:
25/02/2026
Idioma:
Inglés
*** Pendiente de traducción *** A security flaw has been discovered in feiyuchuixue sz-boot-parent up to 1.3.2-beta. This affects an unknown part of the file /api/admin/common/download/templates of the component API. Performing a manipulation of the argument templateName results in path traversal. Remote exploitation of the attack is possible. The exploit has been released to the public and may be used for attacks. Upgrading to version 1.3.3-beta is able to mitigate this issue. The patch is named aefaabfd7527188bfba3c8c9eee17c316d094802. It is recommended to upgrade the affected component. The project was informed beforehand and acted very professional: "We have implemented path validity checks on parameters for the template download interface (...)"
Gravedad CVSS v4.0: MEDIA
Última modificación:
25/02/2026

CVE-2026-3206

Fecha de publicación:
25/02/2026
Idioma:
Inglés
*** Pendiente de traducción *** Improper Resource Shutdown or Release vulnerability in KrakenD, SLU KrakenD-CE (CircuitBreaker modules), KrakenD, SLU KrakenD-EE (CircuitBreaker modules). This issue affects KrakenD-CE: before 2.13.1; KrakenD-EE: before 2.12.5.
Gravedad CVSS v4.0: BAJA
Última modificación:
25/02/2026

CVE-2026-27848

Fecha de publicación:
25/02/2026
Idioma:
Inglés
*** Pendiente de traducción *** Due to missing neutralization of special elements, OS commands can be injected via the handshake of a TLS-SRP connection, which are ultimately run as the root user.<br /> This issue affects MR9600: 1.0.4.205530; MX4200: 1.0.13.210200.
Gravedad CVSS v3.1: CRÍTICA
Última modificación:
26/02/2026