Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-20012: Missing Release of Memory after Effective Lifetime in Cisco IOS

0
High
VulnerabilityCVE-2026-20012cvecve-2026-20012
Published: Wed Mar 25 2026 (03/25/2026, 16:03:12 UTC)
Source: CVE Database V5
Vendor/Project: Cisco
Product: IOS

Description

A vulnerability in the Internet Key Exchange version 2 (IKEv2) feature of Cisco IOS Software, Cisco IOS XE Software, Cisco Secure Firewall Adaptive Security Appliance (ASA) Software, and Cisco Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to trigger a memory leak, resulting in a denial of service (DoS) condition on an affected device. This vulnerability is due to improper parsing of IKEv2 packets. An attacker could exploit this vulnerability by sending crafted IKEv2 packets to an affected device. A successful exploit of Cisco IOS Software and IOS XE Software could allow the attacker to cause the affected device to reload, resulting in a DoS condition. A successful exploit of Cisco Secure Firewall ASA Software and Secure FTD Software could allow the attacker to partially exhaust system memory, resulting in system instability, such as the inability to establish new IKEv2 VPN sessions. A manual reboot of the device is required to recover from this condition.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/25/2026, 16:32:21 UTC

Technical Analysis

CVE-2026-20012 is a vulnerability in the Internet Key Exchange version 2 (IKEv2) implementation within multiple Cisco software products, including Cisco IOS, IOS XE, ASA, and Secure Firewall Threat Defense. The root cause is improper parsing of crafted IKEv2 packets, which leads to a memory leak due to failure to release allocated memory after its effective lifetime. An unauthenticated, remote attacker can exploit this by sending specially crafted IKEv2 packets to the affected device. In Cisco IOS and IOS XE, exploitation can cause the device to reload unexpectedly, resulting in a denial of service (DoS). In Cisco ASA and FTD products, the memory leak can partially exhaust system memory, causing system instability such as the inability to establish new IKEv2 VPN sessions, effectively degrading service availability. Recovery from the DoS condition requires a manual reboot of the device. The vulnerability affects a wide range of Cisco IOS versions, spanning many releases from 15.0 through 15.9, indicating a long-standing issue across multiple product lines. The CVSS v3.1 base score is 8.6 (high), reflecting the network attack vector, no required privileges or user interaction, and a scope change due to potential device reloads. While no known exploits have been reported in the wild, the vulnerability’s characteristics make it a significant threat to network infrastructure relying on Cisco VPN and firewall devices. The vulnerability does not impact confidentiality or integrity directly but severely impacts availability and operational continuity. Cisco has not yet published patches or mitigation details at the time of this report.

Potential Impact

The primary impact of CVE-2026-20012 is denial of service on critical network infrastructure devices. For organizations worldwide using Cisco IOS and IOS XE routers, exploitation can cause unexpected device reloads, leading to network outages and disruption of services dependent on these routers. For Cisco ASA and Secure Firewall Threat Defense deployments, the memory leak can degrade system stability and prevent new VPN sessions, impacting remote access and secure communications. This can affect enterprise networks, service providers, and government agencies that rely on Cisco VPN and firewall solutions for secure connectivity. The inability to establish new VPN sessions can disrupt business continuity, remote workforce access, and inter-site communications. The requirement for manual reboot to recover increases operational overhead and potential downtime. Although confidentiality and integrity are not directly compromised, the availability impact can have cascading effects on organizational operations, incident response, and security posture. The broad range of affected software versions and Cisco’s market dominance in networking equipment means this vulnerability poses a significant risk globally.

Mitigation Recommendations

1. Monitor network traffic for anomalous or malformed IKEv2 packets, especially from untrusted sources, to detect potential exploitation attempts. 2. Implement network-level filtering or rate limiting on UDP port 500 and 4500 (IKEv2 ports) at perimeter firewalls to restrict exposure to untrusted networks. 3. Segment and isolate VPN and firewall infrastructure to limit attack surface and lateral movement. 4. Apply Cisco security advisories and patches promptly once released; track Cisco’s official channels for updates on this vulnerability. 5. Consider temporary mitigation by disabling IKEv2 if feasible and if it does not disrupt critical services, until patches are applied. 6. Schedule maintenance windows to allow for manual reboots if devices become unstable or unresponsive due to exploitation. 7. Maintain up-to-date backups and configuration snapshots to enable rapid recovery. 8. Conduct internal vulnerability scanning and penetration testing focused on IKEv2 implementations to identify exposure. 9. Educate network operations and security teams about this vulnerability and signs of exploitation to improve detection and response readiness.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
cisco
Date Reserved
2025-10-08T11:59:15.350Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69c40a64f4197a8e3b6998f0

Added to database: 3/25/2026, 4:16:36 PM

Last enriched: 3/25/2026, 4:32:21 PM

Last updated: 3/26/2026, 6:48:15 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses