Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-20022: Use of Out-of-range Pointer Offset in Cisco Cisco Secure Firewall Adaptive Security Appliance (ASA) Software

0
Medium
VulnerabilityCVE-2026-20022cvecve-2026-20022
Published: Wed Mar 04 2026 (03/04/2026, 18:35:19 UTC)
Source: CVE Database V5
Vendor/Project: Cisco
Product: Cisco Secure Firewall Adaptive Security Appliance (ASA) Software

Description

CVE-2026-20022 is a medium severity vulnerability affecting Cisco Secure Firewall Adaptive Security Appliance (ASA) and Cisco Secure FTD Software. It arises from insufficient input validation of OSPF Link State Update (LSU) packets when OSPF canonicalization debug is enabled. An unauthenticated, adjacent attacker can exploit this by sending crafted OSPF packets, causing out-of-range pointer writes that lead to device reloads and denial of service (DoS). The vulnerability requires the debug command 'debug ip ospf canon' to be enabled, which is not typically active in production environments. It affects a wide range of Cisco ASA software versions from 9. 12. 1 through 9. 23. 1. 22.

AI-Powered Analysis

AILast updated: 03/04/2026, 19:18:50 UTC

Technical Analysis

CVE-2026-20022 is a vulnerability in the OSPF protocol implementation within Cisco Secure Firewall ASA and Cisco Secure FTD software. The root cause is insufficient input validation when processing OSPF Link State Update (LSU) packets, specifically when the OSPF canonicalization debug feature is enabled via the 'debug ip ospf canon' command. An unauthenticated attacker with adjacent network access can send specially crafted OSPF packets that exploit an out-of-range pointer offset, resulting in memory corruption outside the intended packet data boundaries. This memory corruption triggers an unexpected device reload, causing a denial of service (DoS) condition. The vulnerability affects a broad range of Cisco ASA software versions, spanning from 9.12.1 to 9.23.1.22, indicating a long-standing issue across multiple releases. The attack vector requires adjacency on the network (i.e., the attacker must be on the same Layer 2 or routed network segment) and the debug feature to be enabled, which is generally used for troubleshooting and not enabled by default. The CVSS v3.1 base score is 6.1, reflecting medium severity due to the requirement for high attack complexity and no privileges or user interaction. No confidentiality or integrity impact is noted, as the exploit solely causes availability disruption through device reloads. Cisco has not reported known exploits in the wild, and no patches are linked in the provided data, suggesting that mitigation currently relies on configuration changes or vendor updates once released.

Potential Impact

The primary impact of CVE-2026-20022 is a denial of service condition caused by device reloads of Cisco Secure Firewall ASA and FTD devices. For organizations, this can lead to temporary loss of firewall and routing capabilities, potentially disrupting network security enforcement and connectivity. This is particularly critical for enterprises and service providers that depend on Cisco ASA devices for perimeter defense, VPN termination, and secure routing. The requirement for the OSPF canonicalization debug feature to be enabled limits the exposure in typical production environments, reducing the likelihood of widespread impact. However, in environments where this debug is enabled for troubleshooting or monitoring, an attacker with adjacent network access could exploit this vulnerability to cause repeated device crashes, leading to network instability and potential downtime. The vulnerability does not allow data leakage or unauthorized access, so confidentiality and integrity remain intact. Nonetheless, availability disruptions in critical network infrastructure can have cascading effects on business operations, incident response, and compliance with uptime requirements.

Mitigation Recommendations

1. Immediately verify if the 'debug ip ospf canon' command is enabled on Cisco ASA or FTD devices. If enabled, disable this debug feature to eliminate the attack vector. 2. Monitor network segments where OSPF adjacency exists to detect any anomalous or malformed OSPF LSU packets that could indicate exploitation attempts. 3. Apply Cisco-provided patches or software updates addressing this vulnerability as soon as they become available. 4. Restrict network adjacency to trusted devices only, using segmentation and access control lists (ACLs) to limit exposure to unauthenticated attackers on OSPF-enabled interfaces. 5. Implement robust network monitoring and alerting for device reloads or crashes to enable rapid incident response. 6. Review and harden OSPF configurations to minimize debug usage in production environments, reserving such features for controlled troubleshooting sessions. 7. Engage with Cisco support or security advisories regularly to stay informed about updates or additional mitigations related to this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
cisco
Date Reserved
2025-10-08T11:59:15.352Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a881f6d1a09e29cb675973

Added to database: 3/4/2026, 7:03:18 PM

Last enriched: 3/4/2026, 7:18:50 PM

Last updated: 3/4/2026, 8:37:50 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses