Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-20062: Incorrect Execution-Assigned Permissions in Cisco Cisco Secure Firewall Adaptive Security Appliance (ASA) Software

0
High
VulnerabilityCVE-2026-20062cvecve-2026-20062
Published: Wed Mar 04 2026 (03/04/2026, 17:22:20 UTC)
Source: CVE Database V5
Vendor/Project: Cisco
Product: Cisco Secure Firewall Adaptive Security Appliance (ASA) Software

Description

A vulnerability in the CLI of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software in multiple context mode could allow an authenticated, local attacker with administrative privileges in one context to copy files to or from another context, including configuration files. This vulnerability is due to improper access controls for Secure Copy Protocol (SCP) operations when the CiscoSSH stack is enabled. An attacker could exploit this vulnerability by authenticating to a non-admin context of the device and issuing crafted SCP copy commands in that non-admin context. A successful exploit could allow the attacker to read, create, or overwrite sensitive files that belong to another context, including the admin and system contexts. The attacker cannot directly impact the availability of services pertaining to other contexts. To exploit this vulnerability, the attacker must have valid administrative credentials for a non-admin context. Note: An attacker cannot list or enumerate files from another context and would need to know the exact file path, which increases the complexity of a successful attack.

AI-Powered Analysis

AILast updated: 03/04/2026, 17:49:09 UTC

Technical Analysis

CVE-2026-20062 is a vulnerability in the CLI of Cisco Secure Firewall ASA Software when operating in multiple context mode, which partitions the device into multiple virtual firewalls. The flaw is due to incorrect execution-assigned permissions related to Secure Copy Protocol (SCP) operations handled by the CiscoSSH stack. An attacker who is authenticated locally with administrative privileges in a non-admin context can exploit this by issuing crafted SCP copy commands to copy files to or from other contexts, including the admin and system contexts. This improper access control allows unauthorized reading, creation, or overwriting of sensitive files across contexts. However, the attacker cannot list or enumerate files in other contexts, requiring knowledge of exact file paths, which raises exploitation complexity. The vulnerability does not enable direct disruption of services (availability) in other contexts but severely impacts confidentiality and integrity of data. It affects a wide range of ASA software versions from 9.17.1 to 9.23.1.3. The CVSS v3.1 score is 7.2 (high severity), reflecting local attack vector, high privileges required, no user interaction, and significant confidentiality and integrity impact. No public exploits have been reported yet, but the vulnerability poses a serious risk in environments using multi-context ASA deployments with CiscoSSH enabled.

Potential Impact

The primary impact of CVE-2026-20062 is unauthorized access and modification of sensitive files across different security contexts within Cisco ASA devices. This can lead to exposure of confidential configuration data, potential manipulation of firewall rules, and compromise of system integrity. Organizations relying on multi-context ASA deployments for network segmentation and security isolation may find these boundaries breached, undermining their security posture. Although availability is not directly affected, the confidentiality and integrity breaches could facilitate further attacks, lateral movement, or persistent compromise. The requirement for administrative credentials in a non-admin context limits the attack surface but insider threats or credential compromise scenarios significantly increase risk. Given the widespread use of Cisco ASA devices in enterprise, government, and critical infrastructure networks globally, this vulnerability could have far-reaching consequences if exploited, including data breaches, regulatory non-compliance, and operational disruptions.

Mitigation Recommendations

1. Apply Cisco's security patches or updates for ASA software versions addressing CVE-2026-20062 as soon as they become available. 2. Restrict SCP usage and disable CiscoSSH stack if not required, or limit SCP operations to trusted administrators only. 3. Enforce strict access controls and segmentation between contexts, ensuring minimal administrative privileges are granted per context. 4. Monitor and audit SCP command usage and file access logs for suspicious activity indicative of cross-context file operations. 5. Implement multi-factor authentication for administrative access to reduce risk of credential compromise. 6. Educate administrators about the risks of credential sharing and the importance of context-specific privilege separation. 7. Consider deploying network-level controls to detect anomalous SCP traffic patterns. 8. Regularly review and update firewall configurations to ensure no unnecessary exposure of management interfaces. These steps go beyond generic advice by focusing on limiting SCP usage, enhancing monitoring, and enforcing strict privilege boundaries within multi-context ASA deployments.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
cisco
Date Reserved
2025-10-08T11:59:15.356Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a86ce0d1a09e29cb4f1556

Added to database: 3/4/2026, 5:33:20 PM

Last enriched: 3/4/2026, 5:49:09 PM

Last updated: 3/4/2026, 8:14:46 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses