CVE-2026-20049: Incorrect Calculation of Buffer Size in Cisco Cisco Secure Firewall Adaptive Security Appliance (ASA) Software
A vulnerability in the processing of Galois/Counter Mode (GCM)-encrypted Internet Key Exchange version 2 (IKEv2) IPsec traffic of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an authenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to the allocation of an insufficiently sized block of memory. An attacker could exploit this vulnerability by sending crafted GCM-encrypted IPsec traffic to an affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a DoS condition. To exploit this vulnerability, the attacker must have valid credentials to establish a VPN connection with the affected device.
AI Analysis
Technical Summary
CVE-2026-20049 is a vulnerability identified in Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software. The flaw is due to an incorrect calculation of buffer size during the processing of Galois/Counter Mode (GCM)-encrypted Internet Key Exchange version 2 (IKEv2) IPsec traffic. Specifically, the software allocates an insufficiently sized memory block when handling this encrypted traffic. An attacker who has authenticated access—meaning they possess valid credentials to establish a VPN connection—can exploit this vulnerability by sending specially crafted GCM-encrypted IPsec packets. This crafted traffic causes the device to reload unexpectedly, resulting in a denial of service (DoS) condition. The vulnerability affects a wide range of software versions, including many releases from 9.12.4.x through 9.23.1.3, indicating a long-standing issue across multiple major versions. The CVSS 3.1 base score is 7.7, reflecting a high severity with network attack vector, low attack complexity, required privileges, no user interaction, and a scope change. The impact is limited to availability, with no confidentiality or integrity loss. No known exploits have been reported in the wild to date. The vulnerability is particularly critical for organizations relying on Cisco ASA and FTD devices for secure VPN access, as exploitation disrupts firewall availability and potentially impacts business continuity.
Potential Impact
The primary impact of CVE-2026-20049 is a denial of service condition on affected Cisco firewall devices, which can cause unexpected reloads and temporary loss of firewall functionality. For organizations worldwide, this can disrupt secure VPN connectivity, potentially cutting off remote access for employees and partners. This disruption can affect business operations, especially for organizations heavily dependent on Cisco ASA and FTD devices for perimeter security and VPN services. The requirement for valid credentials to exploit the vulnerability limits the attack surface to authenticated users, but insider threats or compromised credentials could be leveraged by attackers. The broad range of affected software versions means many organizations may be vulnerable if they have not applied patches or mitigations. The DoS condition could also be used as a diversion tactic in multi-stage attacks or to degrade security posture during critical periods. While no confidentiality or integrity impacts are reported, the availability impact alone can have significant operational and financial consequences.
Mitigation Recommendations
Organizations should prioritize patching affected Cisco ASA and FTD devices with the latest software updates provided by Cisco once available. Given the extensive list of affected versions, verifying device software versions and upgrading to non-vulnerable releases is critical. Until patches are applied, organizations should enforce strict access controls and monitoring on VPN authentication mechanisms to reduce the risk of credential compromise. Implementing multi-factor authentication (MFA) for VPN access can further mitigate the risk of unauthorized exploitation. Network segmentation and limiting VPN access to trusted users and devices can reduce exposure. Monitoring VPN traffic for unusual patterns or malformed GCM-encrypted IPsec packets may help detect attempted exploitation. Incident response plans should include procedures for rapid recovery from device reloads to minimize downtime. Regular backups of device configurations and high availability configurations can reduce operational impact. Cisco’s advisories and security bulletins should be closely followed for updates and additional mitigation guidance.
Affected Countries
United States, Canada, United Kingdom, Germany, France, Australia, Japan, South Korea, India, Brazil, Netherlands, Singapore, United Arab Emirates, Israel
CVE-2026-20049: Incorrect Calculation of Buffer Size in Cisco Cisco Secure Firewall Adaptive Security Appliance (ASA) Software
Description
A vulnerability in the processing of Galois/Counter Mode (GCM)-encrypted Internet Key Exchange version 2 (IKEv2) IPsec traffic of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an authenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to the allocation of an insufficiently sized block of memory. An attacker could exploit this vulnerability by sending crafted GCM-encrypted IPsec traffic to an affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a DoS condition. To exploit this vulnerability, the attacker must have valid credentials to establish a VPN connection with the affected device.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-20049 is a vulnerability identified in Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software. The flaw is due to an incorrect calculation of buffer size during the processing of Galois/Counter Mode (GCM)-encrypted Internet Key Exchange version 2 (IKEv2) IPsec traffic. Specifically, the software allocates an insufficiently sized memory block when handling this encrypted traffic. An attacker who has authenticated access—meaning they possess valid credentials to establish a VPN connection—can exploit this vulnerability by sending specially crafted GCM-encrypted IPsec packets. This crafted traffic causes the device to reload unexpectedly, resulting in a denial of service (DoS) condition. The vulnerability affects a wide range of software versions, including many releases from 9.12.4.x through 9.23.1.3, indicating a long-standing issue across multiple major versions. The CVSS 3.1 base score is 7.7, reflecting a high severity with network attack vector, low attack complexity, required privileges, no user interaction, and a scope change. The impact is limited to availability, with no confidentiality or integrity loss. No known exploits have been reported in the wild to date. The vulnerability is particularly critical for organizations relying on Cisco ASA and FTD devices for secure VPN access, as exploitation disrupts firewall availability and potentially impacts business continuity.
Potential Impact
The primary impact of CVE-2026-20049 is a denial of service condition on affected Cisco firewall devices, which can cause unexpected reloads and temporary loss of firewall functionality. For organizations worldwide, this can disrupt secure VPN connectivity, potentially cutting off remote access for employees and partners. This disruption can affect business operations, especially for organizations heavily dependent on Cisco ASA and FTD devices for perimeter security and VPN services. The requirement for valid credentials to exploit the vulnerability limits the attack surface to authenticated users, but insider threats or compromised credentials could be leveraged by attackers. The broad range of affected software versions means many organizations may be vulnerable if they have not applied patches or mitigations. The DoS condition could also be used as a diversion tactic in multi-stage attacks or to degrade security posture during critical periods. While no confidentiality or integrity impacts are reported, the availability impact alone can have significant operational and financial consequences.
Mitigation Recommendations
Organizations should prioritize patching affected Cisco ASA and FTD devices with the latest software updates provided by Cisco once available. Given the extensive list of affected versions, verifying device software versions and upgrading to non-vulnerable releases is critical. Until patches are applied, organizations should enforce strict access controls and monitoring on VPN authentication mechanisms to reduce the risk of credential compromise. Implementing multi-factor authentication (MFA) for VPN access can further mitigate the risk of unauthorized exploitation. Network segmentation and limiting VPN access to trusted users and devices can reduce exposure. Monitoring VPN traffic for unusual patterns or malformed GCM-encrypted IPsec packets may help detect attempted exploitation. Incident response plans should include procedures for rapid recovery from device reloads to minimize downtime. Regular backups of device configurations and high availability configurations can reduce operational impact. Cisco’s advisories and security bulletins should be closely followed for updates and additional mitigation guidance.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- cisco
- Date Reserved
- 2025-10-08T11:59:15.355Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69a86ce0d1a09e29cb4f1553
Added to database: 3/4/2026, 5:33:20 PM
Last enriched: 3/11/2026, 8:14:54 PM
Last updated: 4/19/2026, 1:26:50 PM
Views: 94
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.