Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-20024: Improper Restriction of Operations within the Bounds of a Memory Buffer in Cisco Cisco Secure Firewall Adaptive Security Appliance (ASA) Software

0
Medium
VulnerabilityCVE-2026-20024cvecve-2026-20024
Published: Wed Mar 04 2026 (03/04/2026, 18:35:48 UTC)
Source: CVE Database V5
Vendor/Project: Cisco
Product: Cisco Secure Firewall Adaptive Security Appliance (ASA) Software

Description

A vulnerability in the OSPF protocol of Cisco Secure Firewall ASA Software and Cisco Secure FTD Software could allow an authenticated, adjacent attacker to cause an affected device to reload unexpectedly, resulting in a DoS condition. To exploit this vulnerability, the attacker must have the OSPF secret key. This vulnerability is due to heap corruption in OSPF when parsing packets. An attacker could exploit this vulnerability by sending crafted packets to the OSPF service. A successful exploit could allow the attacker to corrupt the heap, causing the affected device to reload, resulting in a DoS condition.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/11/2026, 20:06:43 UTC

Technical Analysis

CVE-2026-20024 is a vulnerability identified in the Open Shortest Path First (OSPF) protocol implementation within Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firepower Threat Defense (FTD) Software. The flaw arises from improper restriction of operations within the bounds of a memory buffer, specifically a heap corruption issue triggered when parsing OSPF packets. An attacker who is authenticated and adjacent on the network, and who possesses the OSPF secret key, can send specially crafted OSPF packets to the vulnerable device. This crafted input corrupts the heap memory, leading to an unexpected reload of the device, effectively causing a denial-of-service (DoS) condition. The vulnerability affects a wide range of Cisco ASA and FTD software versions, spanning multiple releases from 9.12.1 through 9.23.1. The CVSS v3.1 base score is 6.8, reflecting medium severity, with attack vector being adjacent network, low attack complexity, requiring privileges (OSPF secret key), no user interaction, and scope changed due to impact on device availability. The vulnerability does not impact confidentiality or integrity but significantly affects availability. No public exploits have been reported yet, but the requirement for OSPF secret key and adjacency limits the attack surface. The flaw underscores the criticality of secure OSPF configurations and patch management in network perimeter devices.

Potential Impact

The primary impact of CVE-2026-20024 is a denial-of-service condition on Cisco Secure Firewall ASA and FTD devices, which are widely used in enterprise and service provider networks for perimeter security and routing. A successful exploit causes device reloads, resulting in temporary loss of firewall and routing functionality. This can disrupt network traffic, degrade security posture, and potentially cause outages in critical infrastructure, enterprise networks, and data centers. Since the vulnerability requires adjacency and possession of the OSPF secret key, the risk is mitigated somewhat but remains significant in environments where OSPF neighbors are not fully trusted or where key management is weak. The DoS can impact availability of protected resources, leading to operational downtime, loss of business continuity, and increased risk of secondary attacks during recovery windows. Organizations relying heavily on Cisco ASA/FTD for secure routing and firewalling, especially those with complex OSPF topologies, are at risk of network instability and security gaps if unpatched.

Mitigation Recommendations

1. Apply Cisco's official patches and software updates for all affected ASA and FTD versions as soon as they become available to remediate the heap corruption vulnerability. 2. Restrict OSPF adjacency to trusted and authenticated devices only; enforce strict OSPF authentication using strong, regularly rotated secret keys to prevent unauthorized adjacency. 3. Implement network segmentation and access controls to limit which devices can establish OSPF adjacency with critical firewall devices, reducing exposure to adjacent attackers. 4. Monitor OSPF traffic for anomalous or malformed packets that could indicate exploitation attempts. 5. Employ redundancy and high availability configurations to minimize impact of device reloads caused by potential exploitation. 6. Conduct regular audits of OSPF configurations and secret key management to ensure compliance with security best practices. 7. Use intrusion detection/prevention systems (IDS/IPS) capable of detecting suspicious OSPF packet patterns. 8. Maintain comprehensive incident response plans to quickly address any DoS incidents affecting firewall devices.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
cisco
Date Reserved
2025-10-08T11:59:15.352Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a881f6d1a09e29cb675979

Added to database: 3/4/2026, 7:03:18 PM

Last enriched: 3/11/2026, 8:06:43 PM

Last updated: 4/19/2026, 12:25:47 AM

Views: 57

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses