Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-20021: Missing Release of Memory after Effective Lifetime in Cisco Cisco Secure Firewall Adaptive Security Appliance (ASA) Software

0
Medium
VulnerabilityCVE-2026-20021cvecve-2026-20021
Published: Wed Mar 04 2026 (03/04/2026, 18:35:06 UTC)
Source: CVE Database V5
Vendor/Project: Cisco
Product: Cisco Secure Firewall Adaptive Security Appliance (ASA) Software

Description

A vulnerability in the OSPF protocol of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an authenticated, adjacent attacker to exhaust memory on an affected device, resulting in a denial of service (DoS) condition. This vulnerability is due to improperly validating input by the OSPF protocol when parsing packets. An attacker could exploit this vulnerability by by sending crafted OSPF packets to an affected device. A successful exploit could allow the attacker to exhaust memory on the affected device, resulting in a DoS condition.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/11/2026, 20:08:50 UTC

Technical Analysis

CVE-2026-20021 is a vulnerability in the OSPF protocol implementation within Cisco Secure Firewall Adaptive Security Appliance (ASA) and Cisco Secure Firewall Threat Defense (FTD) software. The flaw stems from improper validation of input when parsing OSPF packets, specifically failing to release memory after its effective lifetime. An authenticated attacker with adjacency to the device can exploit this by sending specially crafted OSPF packets, causing the device to allocate memory that is never freed. Over time, this leads to memory exhaustion, resulting in a denial of service (DoS) condition where the firewall may become unresponsive or crash. The vulnerability affects numerous versions of Cisco ASA software, spanning from 9.12.1 to 9.23.1.22, indicating a long-standing issue across multiple releases. The attack vector requires the attacker to be on an adjacent network segment and authenticated, which limits remote exploitation but still poses a significant risk within trusted or compromised networks. The CVSS v3.1 base score is 4.3, reflecting a medium severity primarily due to the requirement for adjacency and authentication and the impact being limited to availability. No public exploits or active exploitation have been reported to date. This vulnerability highlights the importance of robust input validation and memory management in network protocol implementations within critical security infrastructure devices.

Potential Impact

The primary impact of CVE-2026-20021 is a denial of service condition caused by memory exhaustion on affected Cisco ASA and FTD devices. This can disrupt firewall operations, potentially leading to network outages or degraded security posture due to device unavailability. Organizations relying on these devices for perimeter defense, VPN termination, or internal segmentation could experience significant operational disruption. The requirement for an authenticated, adjacent attacker reduces the likelihood of widespread remote exploitation but does not eliminate risk within internal or partner networks. Attackers who gain access to trusted network segments could leverage this vulnerability to disrupt network security controls, potentially facilitating further attacks or data breaches. Given the widespread deployment of Cisco ASA and FTD devices globally, especially in enterprise, government, and service provider environments, the vulnerability poses a notable risk to critical infrastructure and sensitive networks. The memory exhaustion could also lead to device crashes requiring manual intervention, increasing operational costs and downtime.

Mitigation Recommendations

1. Apply Cisco's official patches or software updates addressing CVE-2026-20021 as soon as they become available to ensure the vulnerability is remediated at the source. 2. Restrict OSPF adjacency and authentication to trusted devices and network segments only, minimizing exposure to potentially malicious actors. 3. Implement strict network segmentation and access controls to limit adjacency to Cisco ASA/FTD devices, reducing the attack surface. 4. Monitor OSPF traffic for anomalies such as unusual packet rates or malformed packets that could indicate exploitation attempts. 5. Employ rate limiting or filtering on OSPF protocol traffic at network boundaries to mitigate potential flooding attacks. 6. Regularly audit and review firewall configurations to ensure only necessary OSPF adjacencies exist and that authentication mechanisms are robust. 7. Maintain comprehensive logging and alerting on firewall health and resource utilization to detect early signs of memory exhaustion or DoS conditions. 8. Consider deploying redundant firewall appliances or high availability configurations to minimize impact of potential DoS events.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
cisco
Date Reserved
2025-10-08T11:59:15.352Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a881f6d1a09e29cb675970

Added to database: 3/4/2026, 7:03:18 PM

Last enriched: 3/11/2026, 8:08:50 PM

Last updated: 4/19/2026, 10:09:12 AM

Views: 72

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses