Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-20023: Out-of-bounds Write in Cisco Cisco Secure Firewall Adaptive Security Appliance (ASA) Software

0
Medium
VulnerabilityCVE-2026-20023cvecve-2026-20023
Published: Wed Mar 04 2026 (03/04/2026, 18:35:35 UTC)
Source: CVE Database V5
Vendor/Project: Cisco
Product: Cisco Secure Firewall Adaptive Security Appliance (ASA) Software

Description

CVE-2026-20023 is a medium-severity vulnerability affecting Cisco Secure Firewall Adaptive Security Appliance (ASA) and Threat Defense (FTD) software. It arises from an out-of-bounds write during OSPF packet parsing, allowing an unauthenticated, adjacent attacker to corrupt memory. Exploitation can cause the device to reboot, resulting in a denial of service (DoS) condition. The vulnerability affects numerous versions of Cisco ASA software, spanning multiple 9. x releases. No known exploits are currently reported in the wild. The attack requires adjacency to the target network segment and does not require user interaction or authentication. Organizations relying on Cisco ASA/FTD devices for perimeter or internal network security should prioritize patching or mitigating this issue to maintain network availability. The vulnerability impacts availability only, with no direct confidentiality or integrity compromise. Countries with significant Cisco firewall deployments and critical infrastructure reliance on these devices are at higher risk.

AI-Powered Analysis

AILast updated: 03/04/2026, 19:18:37 UTC

Technical Analysis

CVE-2026-20023 is a vulnerability in the OSPF protocol implementation within Cisco Secure Firewall Adaptive Security Appliance (ASA) and Cisco Secure Firewall Threat Defense (FTD) software. The flaw is an out-of-bounds write caused by improper memory handling when parsing crafted OSPF packets. An unauthenticated attacker who is adjacent on the network can send malicious OSPF packets to the affected device, triggering memory corruption. This corruption leads to a denial of service condition by causing the device to reboot unexpectedly. The vulnerability affects a wide range of Cisco ASA software versions, specifically multiple releases in the 9.12 through 9.23 series. The CVSS v3.1 base score is 6.1, reflecting medium severity, with the vector indicating attack complexity is high, no privileges required, no user interaction, and the scope is changed due to impact on device availability. No known exploits have been reported in the wild as of the publication date. The vulnerability specifically impacts availability, with no direct impact on confidentiality or integrity. The attack requires adjacency, meaning the attacker must be on the same or a directly connected network segment as the vulnerable device, which limits remote exploitation. However, given the critical role of Cisco ASA and FTD devices in network security, successful exploitation could disrupt network operations significantly.

Potential Impact

The primary impact of CVE-2026-20023 is a denial of service condition caused by device reboot, which can disrupt network security enforcement and traffic flow. Organizations relying on Cisco ASA and FTD devices for firewalling, VPN termination, or intrusion prevention may experience outages or degraded security posture during exploitation. This can lead to temporary loss of network availability, increased exposure to other threats, and potential operational downtime. Critical infrastructure, government networks, and large enterprises that depend heavily on Cisco firewalls for perimeter defense are particularly vulnerable to operational disruption. Although the vulnerability does not allow data theft or modification, the loss of firewall functionality can indirectly increase risk by exposing internal networks to attacks. The requirement for adjacency limits the attack surface but does not eliminate risk in environments where attackers can gain local network access, such as compromised internal segments or exposed network zones. The broad range of affected software versions means many deployed devices are potentially vulnerable, increasing the global impact scope.

Mitigation Recommendations

1. Apply Cisco's security patches or software updates for ASA and FTD devices as soon as they become available to remediate the vulnerability. 2. Restrict OSPF adjacency and routing protocol traffic to trusted network segments only, using access control lists (ACLs) or firewall rules to limit exposure to untrusted or external networks. 3. Segment management and routing protocol traffic from general user networks to reduce the risk of adjacent attackers. 4. Monitor network traffic for anomalous or malformed OSPF packets that could indicate exploitation attempts. 5. Employ network intrusion detection/prevention systems (IDS/IPS) tuned to detect unusual OSPF behavior. 6. Conduct regular audits of device software versions and configurations to ensure compliance with security best practices. 7. Consider disabling OSPF on devices or interfaces where it is not required to reduce attack surface. 8. Implement network segmentation and zero trust principles to limit lateral movement opportunities for attackers who gain adjacency. 9. Maintain incident response readiness to quickly isolate and remediate affected devices in case of exploitation. These steps go beyond generic advice by focusing on limiting adjacency exposure and proactive monitoring specific to OSPF protocol traffic.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
cisco
Date Reserved
2025-10-08T11:59:15.352Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a881f6d1a09e29cb675976

Added to database: 3/4/2026, 7:03:18 PM

Last enriched: 3/4/2026, 7:18:37 PM

Last updated: 3/4/2026, 8:27:44 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses