Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-20023: Out-of-bounds Write in Cisco Cisco Secure Firewall Adaptive Security Appliance (ASA) Software

0
Medium
VulnerabilityCVE-2026-20023cvecve-2026-20023
Published: Wed Mar 04 2026 (03/04/2026, 18:35:35 UTC)
Source: CVE Database V5
Vendor/Project: Cisco
Product: Cisco Secure Firewall Adaptive Security Appliance (ASA) Software

Description

A vulnerability in the OSPF protocol of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, adjacent attacker to corrupt memory on an affected device, resulting in a denial of service (DoS) condition. This vulnerability is due to memory corruption when parsing OSPF protocol packets. An attacker could exploit this vulnerability by sending crafted OSPF packets to an affected device. A successful exploit could allow the attacker to cause memory corruption causing the affected device to reboot, resulting in a DoS condition.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/11/2026, 20:06:30 UTC

Technical Analysis

CVE-2026-20023 is a vulnerability in the OSPF protocol implementation within Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software. The flaw is an out-of-bounds write caused by improper memory handling when parsing OSPF packets. An unauthenticated attacker positioned adjacent to the target device can send specially crafted OSPF packets that trigger memory corruption. This corruption leads to instability and forces the device to reboot, causing a denial of service (DoS) condition. The vulnerability affects a wide range of ASA software versions from 9.12.1 through 9.23.1.22, indicating a long-standing issue across multiple software releases. The CVSS v3.1 score is 6.1 (medium severity), reflecting the attack vector as adjacent network (AV:A), high attack complexity (AC:H), no privileges required (PR:N), no user interaction (UI:N), and impact limited to availability (A:H) without affecting confidentiality or integrity. No known exploits have been reported in the wild, but the vulnerability poses a risk to network availability, especially in environments where OSPF is used for routing and Cisco ASA devices enforce security policies. The flaw does not allow code execution or data theft but can disrupt network operations by causing device reboots. The vulnerability is particularly critical in environments where high availability and uptime are essential. Cisco firewall devices are widely deployed globally in enterprise, government, and service provider networks, making this vulnerability relevant to many organizations.

Potential Impact

The primary impact of CVE-2026-20023 is denial of service through forced device reboots caused by memory corruption. Organizations using Cisco ASA or FTD devices with affected versions may experience network outages, loss of firewall protection, and routing disruptions. This can lead to downtime for critical applications and services, increased operational costs, and potential exposure to other threats during the outage window. The vulnerability does not compromise confidentiality or integrity but affects availability, which can be critical in sectors like finance, healthcare, government, and telecommunications. Since the attack requires adjacency, the threat is more pronounced in environments where untrusted devices share the same network segment or where OSPF adjacency is not tightly controlled. The wide range of affected versions means many organizations may be vulnerable if they have not applied updates. The lack of known exploits in the wild reduces immediate risk but does not eliminate the potential for future exploitation. Overall, the impact is medium but can escalate if exploited in sensitive or high-availability environments.

Mitigation Recommendations

1. Apply Cisco's security patches and updates for ASA and FTD software as soon as they become available to address this vulnerability. 2. Restrict OSPF adjacency to trusted and authenticated devices only, using access control lists (ACLs) or network segmentation to limit exposure to untrusted adjacent hosts. 3. Monitor network traffic for unusual or malformed OSPF packets that could indicate exploitation attempts. 4. Implement network segmentation to isolate critical firewall devices from potentially hostile network segments. 5. Use Cisco's recommended best practices for OSPF configuration, including authentication of OSPF neighbors to prevent unauthorized adjacency. 6. Regularly audit and update firewall software versions to ensure they are not running vulnerable releases. 7. Employ redundancy and failover mechanisms to minimize service disruption in case of device reboot. 8. Maintain incident response plans that include procedures for handling DoS conditions caused by network device failures. These steps go beyond generic advice by focusing on OSPF-specific controls and network architecture hardening tailored to the vulnerability's attack vector.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
cisco
Date Reserved
2025-10-08T11:59:15.352Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a881f6d1a09e29cb675976

Added to database: 3/4/2026, 7:03:18 PM

Last enriched: 3/11/2026, 8:06:30 PM

Last updated: 4/19/2026, 12:19:57 AM

Views: 125

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses