THIS FIELD NOTICE IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTY OF MERCHANTABILITY. YOUR USE OF THE INFORMATION ON THE FIELD NOTICE OR MATERIALS LINKED FROM THE FIELD NOTICE IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS FIELD NOTICE AT ANY TIME.
| Affected Software Product | Affected Release | Affected Release Number | Comments |
|---|---|---|---|
| NX-OS System Software | 10 | 10.5(1), 10.5(2), 10.5(3) |
| Defect ID | Headline |
| CSCwr21007 | Upgrade/downgrade between NXOS 10.4(6) <--> 10.5(1),10.5(3),10.5(3) cause config corruption |
Upgrades or downgrades between certain releases of Cisco NX-OS Software for Cisco Nexus 3000 and Nexus 9000 Series platforms may fail or cause configuration corruption. The issue occurs when initially upgrading or downgrading between Release 10.4(6)M or a later 10.4(x) release and Release 10.5(1)F, 10.5(2)F, or 10.5(3)F. Disruptive and non-disruptive upgrades are affected, but workarounds are available.
This risk only exists between specific releases, as detailed in the following tables.
Upgrading from a release listed in the left column to one of the releases in the same row in the right column may cause this issue.
| Current Cisco NX-OS Software Release | Upgrade NX-OS-Software Release That May Cause Issue |
|---|---|
| 10.4(6)M | 10.5(1)F 10.5(2)F 10.5(3)F |
| 10.4(7)M1 | 10.5(1)F 10.5(2)F 10.5(3)F |
| 10.4(8)M1 | 10.5(1)F 10.5(2)F 10.5(3)F |
| Later 10.4(x)M releases1 | 10.5(1)F 10.5(2)F 10.5(3)F |
Downgrading from one of the releases listed in the left column to the release in the same row in the right column may cause this issue.
| Current Cisco NX-OS Software Release | Downgrade NX-OS-Software Release That May Cause Issue |
|---|---|
| 10.5(1)F 10.5(2)F 10.5(3)F |
10.4(6)M |
| 10.5(1)F 10.5(2)F 10.5(3)F |
10.4(7)M |
| 10.5(1)F 10.5(2)F 10.5(3)F |
10.4(8)M |
| 10.5(1)F 10.5(2)F 10.5(3)F |
Later 10.4(x) releases |
The following upgrading scenarios will not cause this issue and are safe:
The following downgrading scenarios will not cause this issue and are safe:
If the issue has occurred after an upgrade from Release 10.4(6)M or a later 10.4(x) release to Release 10.5(1)F, 10.5(2)F, or 10.5(3)F, you cannot address the issue by downgrading to 10.4(6) or an earlier 10.4 release. You must take one of the following actions:
No non-disruptive recovery procedure is available if the issue has already occurred. See Workaround/Solution section for additional information.
If the upgrade from Release 10.4(6)M or a later 10.4(x)M sequential release was not performed and you are not having the issue, downgrade from 10.5(1, 2 or 3)F to 10.4(1,2,3,4, or 5), then, if needed, upgrade to 10.4(6)M or a later 10.4(x)M sequential release.
This issue can affect Cisco Nexus 3000 or 9000 platforms (TOR and modular chassis) when performing disruptive or non-disruptive upgrades or downgrades between the affected releases only. See the table in Problem Description.
When this issue occurs, the upgrade or downgrade process will exit without proceeding, or configuration corruption will occur after the upgrade or downgrade. The config corruption may show up as garbled VLAN names, missing configurations, spurious segment IDs, missing items from operational VLAN listings or switch virtual interface (SVI) listings, numbering issues, and other configuration errors. SVIs for affected VLANs may be in a down state, and startup-config parsing for VLANs may fail. Segment IDs appear even though related features (such as VXLAN/VN-segment) are not enabled.
After disruptive or non-disruptive upgrades or disruptive downgrades, configuration will be corrupted and not complete. Examples of known symptoms include:
Important: Reloading will not recover the devices from this issue, nor will consequent downgrade to the earlier release. The only way to recover is to do an ASCII reload or write erase and reconfigure the device. See Workaround/Solution section.
Recommended Solution
Upgrade from 10.4(6)M, 10.4(7)M and 10.4(continued higher releases)M directly to 10.5(4)M release or 10.5(continued higher releases)M and skip 10.5(1)F, 10.5(2)F, and 10.5(3)F.
Recovery Options (If Already Affected)
Option 1: ASCII Reload
Performing ASCII reload resolves the issue and restores missing configuration:
switch# reload ascii
!!!WARNING! This command will erase binary configuration
in this VDC and reboot the system with ascii configuration.
Do you wish to proceed anyway? (y/n) [n] y
Note: The configuration needs to be verified after the ASCII reload, and restored if needed, because part of config may be missing. For more information, see the Understand the Reload ASCII Command TechNote.
Option 2: Write Erase and Restore
After performing an upgrade or downgrade on an affected path, write erase and reload the device and recover the configuration from backup. After the reload, the switch will boot up with no configuration, so be sure to set up a way to access it before doing the reload (such as console access or POAP).
switch# write erase
Warning: This command will erase the startup-configuration.
Do you wish to proceed anyway? (y/n) [n] y
switch# reload
This command will reboot the system. (y/n)? [y]
Avoidance: Alternative Upgrade Path to Get to 10.5(1,2,3)F
If upgrade from 10.4(6,7,8, etc.)M to 10.5(1,2 or 3)F is absolutely necessary, the following upgrade path can be taken (disruptive upgrade):
10.4(6)M → 10.5(4)M → 10.5(3)F
Cisco Nexus 9000 or 3000 platforms (TOR or modular chassis) are at risk of this upgrade/downgrade problem only if one of the following is true:
To check current Cisco NX-OS Software release, use the show version command. Look for NX-OS release number in the output to find your current release. Check the filename for your target release.
| Version | Description | Section | Date |
| 1.0 | Initial Release | — | 2026-FEB-02 |
For further assistance or for more information about this field notice, contact the Cisco Technical Assistance Center (TAC) using one of the following methods:
To receive email updates about Field Notices (reliability and safety issues), Security Advisories (network security issues), and end-of-life announcements for specific Cisco products, set up a profile in My Notifications.
Unleash the Power of TAC's Virtual Assistance