Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-20049: Incorrect Calculation of Buffer Size in Cisco Cisco Secure Firewall Adaptive Security Appliance (ASA) Software

0
High
VulnerabilityCVE-2026-20049cvecve-2026-20049
Published: Wed Mar 04 2026 (03/04/2026, 17:22:02 UTC)
Source: CVE Database V5
Vendor/Project: Cisco
Product: Cisco Secure Firewall Adaptive Security Appliance (ASA) Software

Description

A vulnerability in the processing of Galois/Counter Mode (GCM)-encrypted Internet Key Exchange version 2 (IKEv2) IPsec traffic of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an authenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to the allocation of an insufficiently sized block of memory. An attacker could exploit this vulnerability by sending crafted GCM-encrypted IPsec traffic to an affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a DoS condition. To exploit this vulnerability, the attacker must have valid credentials to establish a VPN connection with the affected device.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/11/2026, 20:14:54 UTC

Technical Analysis

CVE-2026-20049 is a vulnerability identified in Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software. The flaw is due to an incorrect calculation of buffer size during the processing of Galois/Counter Mode (GCM)-encrypted Internet Key Exchange version 2 (IKEv2) IPsec traffic. Specifically, the software allocates an insufficiently sized memory block when handling this encrypted traffic. An attacker who has authenticated access—meaning they possess valid credentials to establish a VPN connection—can exploit this vulnerability by sending specially crafted GCM-encrypted IPsec packets. This crafted traffic causes the device to reload unexpectedly, resulting in a denial of service (DoS) condition. The vulnerability affects a wide range of software versions, including many releases from 9.12.4.x through 9.23.1.3, indicating a long-standing issue across multiple major versions. The CVSS 3.1 base score is 7.7, reflecting a high severity with network attack vector, low attack complexity, required privileges, no user interaction, and a scope change. The impact is limited to availability, with no confidentiality or integrity loss. No known exploits have been reported in the wild to date. The vulnerability is particularly critical for organizations relying on Cisco ASA and FTD devices for secure VPN access, as exploitation disrupts firewall availability and potentially impacts business continuity.

Potential Impact

The primary impact of CVE-2026-20049 is a denial of service condition on affected Cisco firewall devices, which can cause unexpected reloads and temporary loss of firewall functionality. For organizations worldwide, this can disrupt secure VPN connectivity, potentially cutting off remote access for employees and partners. This disruption can affect business operations, especially for organizations heavily dependent on Cisco ASA and FTD devices for perimeter security and VPN services. The requirement for valid credentials to exploit the vulnerability limits the attack surface to authenticated users, but insider threats or compromised credentials could be leveraged by attackers. The broad range of affected software versions means many organizations may be vulnerable if they have not applied patches or mitigations. The DoS condition could also be used as a diversion tactic in multi-stage attacks or to degrade security posture during critical periods. While no confidentiality or integrity impacts are reported, the availability impact alone can have significant operational and financial consequences.

Mitigation Recommendations

Organizations should prioritize patching affected Cisco ASA and FTD devices with the latest software updates provided by Cisco once available. Given the extensive list of affected versions, verifying device software versions and upgrading to non-vulnerable releases is critical. Until patches are applied, organizations should enforce strict access controls and monitoring on VPN authentication mechanisms to reduce the risk of credential compromise. Implementing multi-factor authentication (MFA) for VPN access can further mitigate the risk of unauthorized exploitation. Network segmentation and limiting VPN access to trusted users and devices can reduce exposure. Monitoring VPN traffic for unusual patterns or malformed GCM-encrypted IPsec packets may help detect attempted exploitation. Incident response plans should include procedures for rapid recovery from device reloads to minimize downtime. Regular backups of device configurations and high availability configurations can reduce operational impact. Cisco’s advisories and security bulletins should be closely followed for updates and additional mitigation guidance.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
cisco
Date Reserved
2025-10-08T11:59:15.355Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a86ce0d1a09e29cb4f1553

Added to database: 3/4/2026, 5:33:20 PM

Last enriched: 3/11/2026, 8:14:54 PM

Last updated: 4/19/2026, 1:26:50 PM

Views: 94

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses