Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-20022: Use of Out-of-range Pointer Offset in Cisco Cisco Secure Firewall Adaptive Security Appliance (ASA) Software

0
Medium
VulnerabilityCVE-2026-20022cvecve-2026-20022
Published: Wed Mar 04 2026 (03/04/2026, 18:35:19 UTC)
Source: CVE Database V5
Vendor/Project: Cisco
Product: Cisco Secure Firewall Adaptive Security Appliance (ASA) Software

Description

A vulnerability in the OSPF protocol of Cisco Secure Firewall ASA Software and Cisco Secure FTD Software could allow an unauthenticated, adjacent attacker to cause an affected device to reload unexpectedly, resulting in a DoS condition when OSPF canonicalization debug is enabled by using the command debug ip ospf canon. This vulnerability is due to insufficient input validation when processing OSPF LSU packets. An attacker could exploit this vulnerability by sending crafted unauthenticated OSPF packets. A successful exploit could allow the attacker to write to memory outside of the packet data, causing the device to reload, resulting in a DoS condition.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/11/2026, 20:09:04 UTC

Technical Analysis

CVE-2026-20022 is a vulnerability identified in the OSPF protocol implementation within Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firepower Threat Defense (FTD) Software. The flaw is due to insufficient input validation when processing OSPF Link State Update (LSU) packets, specifically under conditions where the OSPF canonicalization debug feature is enabled via the command 'debug ip ospf canon'. This debug mode introduces a code path that fails to properly validate pointer offsets, allowing an attacker to craft malicious OSPF packets that cause out-of-range memory writes. Such memory corruption leads to an unexpected device reload, effectively causing a denial-of-service (DoS) condition. The attack vector requires the attacker to be adjacent on the network (i.e., able to send OSPF packets directly to the target), but no authentication or user interaction is needed. The vulnerability affects a wide range of Cisco ASA and FTD software versions, spanning multiple releases from 9.12.x through 9.23.x. The CVSS v3.1 score is 6.1 (medium), reflecting the attack complexity (high, due to adjacency requirement) and the impact limited to availability. No known exploits have been reported in the wild, but the extensive affected version range and the critical role of ASA/FTD devices in network security make this a significant concern. The vulnerability does not compromise confidentiality or integrity but can disrupt network operations by causing device reloads.

Potential Impact

The primary impact of CVE-2026-20022 is a denial-of-service condition resulting from unexpected device reloads. For organizations, this can lead to temporary loss of firewall and routing capabilities, potentially disrupting network traffic flow and security enforcement. In environments relying heavily on Cisco ASA or FTD devices for perimeter defense and OSPF routing, such disruptions can cause outages, degrade service availability, and increase exposure to other threats during downtime. Critical infrastructure sectors, large enterprises, and service providers using affected versions with OSPF debug enabled are particularly vulnerable. Although the vulnerability does not allow data theft or manipulation, the loss of availability can have cascading effects on business continuity, incident response, and compliance. The requirement for adjacency limits remote exploitation but does not eliminate risk in environments where attackers can gain network proximity, such as compromised internal hosts or malicious insiders.

Mitigation Recommendations

To mitigate CVE-2026-20022, organizations should first verify whether the OSPF canonicalization debug feature ('debug ip ospf canon') is enabled on affected Cisco ASA or FTD devices. If enabled, it should be disabled immediately to eliminate the vulnerable code path. Cisco has not provided explicit patch links in the provided data, so organizations should monitor Cisco security advisories for official patches or updates addressing this vulnerability and apply them promptly once available. Network segmentation and strict control of adjacency to critical firewall devices can reduce exposure by limiting which hosts can send OSPF packets. Implementing robust network monitoring to detect unusual OSPF traffic patterns may help identify exploitation attempts. Additionally, organizations should review and harden OSPF configurations, ensuring authentication mechanisms are in place where possible, even though this vulnerability does not require authentication. Regular firmware and software updates, combined with configuration audits, will help maintain a secure posture against similar protocol-level vulnerabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
cisco
Date Reserved
2025-10-08T11:59:15.352Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a881f6d1a09e29cb675973

Added to database: 3/4/2026, 7:03:18 PM

Last enriched: 3/11/2026, 8:09:04 PM

Last updated: 4/19/2026, 12:27:30 AM

Views: 63

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses