Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-20013: Missing Release of Memory after Effective Lifetime in Cisco Cisco Secure Firewall Adaptive Security Appliance (ASA) Software

0
Medium
VulnerabilityCVE-2026-20013cvecve-2026-20013
Published: Wed Mar 04 2026 (03/04/2026, 17:21:16 UTC)
Source: CVE Database V5
Vendor/Project: Cisco
Product: Cisco Secure Firewall Adaptive Security Appliance (ASA) Software

Description

A vulnerability in the IKEv2 feature of Cisco Secure Firewall ASA Software and Cisco Secure FTD Software could allow an unauthenticated, remote attacker to cause a DoS condition on an affected device that may also impact the availability of services to devices elsewhere in the network. This vulnerability is due to memory exhaustion caused by not freeing memory during IKEv2 packet processing. An attacker could exploit this vulnerability by sending crafted IKEv2 packets to an affected device. A successful exploit could allow the attacker to exhaust resources, causing a DoS condition that will eventually require the device to manually reload.

AI-Powered Analysis

AILast updated: 03/04/2026, 17:51:30 UTC

Technical Analysis

CVE-2026-20013 is a vulnerability identified in the Internet Key Exchange version 2 (IKEv2) feature of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firepower Threat Defense (FTD) Software. The root cause is a failure to release allocated memory after its effective lifetime during the processing of IKEv2 packets. This leads to memory exhaustion on the affected device. An unauthenticated, remote attacker can exploit this vulnerability by sending specially crafted IKEv2 packets to the device, triggering the memory leak and eventually exhausting system resources. The exhaustion of memory resources causes a denial-of-service (DoS) condition, which can disrupt the availability of the firewall and potentially impact network services for other devices relying on it. The device may become unresponsive and require a manual reload to restore normal operation. The vulnerability affects a broad range of Cisco ASA software versions from 9.12.1 through 9.23.1.7, indicating a long-standing issue across multiple releases. The CVSS v3.1 base score is 5.8 (medium severity), reflecting that the attack vector is network-based, requires no privileges or user interaction, and impacts availability without compromising confidentiality or integrity. No public exploits or active exploitation in the wild have been reported to date. However, given the critical role of Cisco ASA and FTD devices in network security infrastructure, this vulnerability poses a significant risk to network uptime and service continuity if exploited.

Potential Impact

The primary impact of CVE-2026-20013 is a denial-of-service condition on Cisco Secure Firewall ASA and FTD devices, which are widely deployed as perimeter security devices in enterprise, government, and service provider networks worldwide. Successful exploitation can cause the firewall device to exhaust memory resources, leading to service disruption and potential network outages. This can affect the availability of critical network services and security enforcement, potentially exposing internal networks to further attacks or operational downtime. Since the vulnerability requires no authentication and no user interaction, it can be exploited remotely by any attacker with network access to the affected device's IKEv2 service. The scope of impact is significant given the broad range of affected software versions and the critical role these devices play in network defense. Although confidentiality and integrity are not directly impacted, the loss of availability can have cascading effects on business operations, incident response, and compliance with security policies. Organizations relying on Cisco ASA/FTD devices for VPN termination or firewalling are particularly at risk, as the IKEv2 protocol is commonly used for VPN connections.

Mitigation Recommendations

1. Apply Cisco's official patches or software updates addressing CVE-2026-20013 as soon as they become available for your specific ASA/FTD software version. 2. If immediate patching is not possible, consider disabling the IKEv2 feature temporarily if it is not in use or can be replaced with alternative VPN protocols. 3. Implement network-level filtering to restrict access to the IKEv2 service (UDP port 500 and 4500) to trusted IP addresses only, minimizing exposure to untrusted networks. 4. Monitor firewall logs and network traffic for unusual or excessive IKEv2 packet activity that could indicate exploitation attempts. 5. Employ rate limiting or intrusion prevention system (IPS) rules to detect and block malformed or suspicious IKEv2 packets. 6. Regularly review and update firewall configurations to ensure minimal exposure of management and VPN services to the internet. 7. Conduct periodic memory and resource usage monitoring on ASA/FTD devices to detect early signs of resource exhaustion. 8. Maintain an incident response plan that includes procedures for rapid device reload or failover in case of DoS conditions. These mitigations go beyond generic advice by focusing on limiting attack surface, proactive monitoring, and operational readiness specific to this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
cisco
Date Reserved
2025-10-08T11:59:15.350Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a86cded1a09e29cb4f151a

Added to database: 3/4/2026, 5:33:18 PM

Last enriched: 3/4/2026, 5:51:30 PM

Last updated: 3/5/2026, 5:52:40 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses