Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-20025: Integer Overflow or Wraparound in Cisco Cisco Secure Firewall Adaptive Security Appliance (ASA) Software

0
Medium
VulnerabilityCVE-2026-20025cvecve-2026-20025
Published: Wed Mar 04 2026 (03/04/2026, 18:36:02 UTC)
Source: CVE Database V5
Vendor/Project: Cisco
Product: Cisco Secure Firewall Adaptive Security Appliance (ASA) Software

Description

A vulnerability in the OSPF protocol of Cisco Secure Firewall ASA Software and Cisco Secure FTD Software could allow an authenticated, adjacent attacker to cause an affected device to reload unexpectedly, resulting in a DoS condition. To exploit this vulnerability, the attacker must have the OSPF secret key. This vulnerability is due to insufficient input validation when processing OSPF link-state update (LSU) packets. An attacker could exploit this vulnerability by sending crafted OSPF LSU packets. A successful exploit could allow the attacker to corrupt the heap, causing the device to reload, resulting in a DoS condition.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/11/2026, 20:07:00 UTC

Technical Analysis

CVE-2026-20025 is a vulnerability identified in the Open Shortest Path First (OSPF) protocol implementation within Cisco Secure Firewall Adaptive Security Appliance (ASA) and Cisco Secure Firepower Threat Defense (FTD) software. The flaw arises from insufficient input validation when processing OSPF link-state update (LSU) packets, specifically leading to an integer overflow or wraparound condition. An authenticated attacker who is adjacent on the network and possesses the OSPF secret key can craft malicious LSU packets that exploit this flaw. The crafted packets cause heap corruption within the device’s memory management, which leads to an unexpected reload of the affected device, resulting in a denial-of-service (DoS) condition. The vulnerability affects a broad range of Cisco ASA software versions, spanning from 9.12.1 up to 9.23.1.13, indicating a long-standing issue across multiple releases. The attack vector requires the attacker to be adjacent to the vulnerable device and have knowledge of the OSPF secret key, which is typically shared among trusted routers in an OSPF area. The CVSS v3.1 base score is 6.8, reflecting a medium severity rating with the vector indicating low attack complexity, low privileges required, no user interaction, and a scope change due to the device reload. There is no impact on confidentiality or integrity, but availability is significantly affected. No public exploits or active exploitation in the wild have been reported at this time. The vulnerability underscores the importance of robust input validation in routing protocol implementations and the risks posed by trusted protocol adjacencies.

Potential Impact

The primary impact of CVE-2026-20025 is a denial-of-service condition caused by device reloads triggered by heap corruption. For organizations relying on Cisco Secure Firewall ASA or FTD devices for perimeter security and routing, this can lead to temporary loss of firewall and routing capabilities, potentially disrupting network traffic and security enforcement. The requirement for adjacency and possession of the OSPF secret key limits the risk to environments where OSPF is actively used and where the attacker can gain network proximity and authentication. However, in large enterprise or service provider networks where OSPF is common, an attacker who compromises a router or gains insider access could exploit this vulnerability to cause network outages or degrade service availability. This could impact critical infrastructure, financial institutions, government agencies, and other sectors relying on Cisco ASA devices for secure and reliable network operations. The lack of confidentiality or integrity impact reduces the risk of data breach or manipulation, but the availability impact can still cause significant operational disruption and potential cascading effects in complex network topologies.

Mitigation Recommendations

To mitigate CVE-2026-20025, organizations should: 1) Apply Cisco’s security patches or software updates that address this vulnerability as soon as they become available, prioritizing devices running affected ASA and FTD versions. 2) Restrict OSPF adjacency to trusted devices only by enforcing strict authentication and network segmentation to limit exposure to untrusted or potentially compromised devices. 3) Regularly rotate and protect OSPF secret keys to reduce the risk of key compromise. 4) Monitor OSPF traffic for anomalous or malformed LSU packets that could indicate exploitation attempts. 5) Implement network access controls to prevent unauthorized devices from establishing adjacency with critical routers or firewalls. 6) Consider deploying redundant firewall and routing paths to maintain availability in case of device reloads. 7) Conduct regular security audits and vulnerability assessments of network devices to identify and remediate similar protocol-level weaknesses. These steps go beyond generic advice by focusing on OSPF-specific controls and operational best practices tailored to the nature of this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
cisco
Date Reserved
2025-10-08T11:59:15.352Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a881f6d1a09e29cb67597c

Added to database: 3/4/2026, 7:03:18 PM

Last enriched: 3/11/2026, 8:07:00 PM

Last updated: 4/19/2026, 12:18:34 AM

Views: 86

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses