Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-20066: Uncontrolled Resource Consumption in Cisco Cisco Secure Firewall Threat Defense (FTD) Software

0
Medium
VulnerabilityCVE-2026-20066cvecve-2026-20066
Published: Wed Mar 04 2026 (03/04/2026, 17:49:00 UTC)
Source: CVE Database V5
Vendor/Project: Cisco
Product: Cisco Secure Firewall Threat Defense (FTD) Software

Description

Multiple Cisco products are affected by a vulnerability in the Snort 3 Detection Engine that could allow an unauthenticated, remote attacker to cause the Snort 3 Detection Engine to restart, resulting in an interruption of packet inspection. This vulnerability is due to an error in the JSTokenizer normalization logic when the HTTP inspection normalizes JavaScript. An attacker could exploit this vulnerability by sending crafted HTTP packets through an established connection that is parsed by Snort 3. A successful exploit could allow the attacker to cause a DoS condition when the Snort 3 Detection Engine restarts unexpectedly. JSTokenizer is not enabled by default.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/11/2026, 20:17:41 UTC

Technical Analysis

CVE-2026-20066 is a vulnerability found in the Snort 3 Detection Engine component of Cisco Secure Firewall Threat Defense (FTD) software, specifically in the JSTokenizer normalization logic used during HTTP inspection of JavaScript content. The flaw causes the Snort 3 engine to restart unexpectedly when processing specially crafted HTTP packets containing malicious JavaScript payloads. This uncontrolled resource consumption leads to a denial-of-service (DoS) condition by interrupting the firewall's packet inspection capabilities. The vulnerability affects numerous versions of Cisco FTD software ranging from 7.4.0 through 7.7.10.1, with the JSTokenizer feature not enabled by default, which reduces the attack surface. Exploitation requires no authentication or user interaction and can be performed remotely over the network. The CVSS v3.1 base score is 5.8, reflecting medium severity due to the impact on availability without compromising confidentiality or integrity. No known public exploits have been reported to date. The root cause lies in an error in the JSTokenizer’s handling of JavaScript normalization, which when triggered, causes the detection engine to restart, temporarily disabling packet inspection and potentially allowing malicious traffic to pass uninspected during that window.

Potential Impact

The primary impact of this vulnerability is a denial-of-service condition affecting the availability of Cisco Secure Firewall Threat Defense’s packet inspection capabilities. When exploited, the Snort 3 Detection Engine restarts, causing temporary interruption in traffic inspection and potentially allowing malicious or unauthorized traffic to bypass security controls. This can degrade network security posture and increase the risk of further attacks or data exfiltration during the downtime. Organizations relying on Cisco FTD for perimeter defense or internal segmentation may experience reduced effectiveness of their intrusion detection and prevention systems. Although confidentiality and integrity are not directly impacted, the loss of availability can have cascading effects on overall network security and operational continuity. The fact that exploitation requires no authentication and can be performed remotely increases the risk, especially in environments where JSTokenizer is enabled. However, since JSTokenizer is disabled by default, the exposure is somewhat limited. No known exploits in the wild reduce immediate risk but do not eliminate the need for remediation.

Mitigation Recommendations

1. Apply Cisco’s security updates and patches for all affected versions of Cisco Secure Firewall Threat Defense software as soon as they become available. 2. If JSTokenizer functionality is not required for your environment, disable it to reduce the attack surface. 3. Monitor network traffic for unusual HTTP packets that could indicate attempts to exploit this vulnerability, focusing on JavaScript content inspection. 4. Implement network segmentation and strict access controls to limit exposure of Cisco FTD devices to untrusted networks. 5. Regularly audit and update firewall and intrusion detection/prevention system configurations to ensure best practices are followed. 6. Employ layered security controls such as endpoint protection and network anomaly detection to mitigate risks during potential downtime of the Snort engine. 7. Maintain up-to-date incident response plans to quickly address any denial-of-service events impacting firewall inspection capabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
cisco
Date Reserved
2025-10-08T11:59:15.357Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a8777ad1a09e29cb54d37d

Added to database: 3/4/2026, 6:18:34 PM

Last enriched: 3/11/2026, 8:17:41 PM

Last updated: 4/19/2026, 9:24:31 AM

Views: 47

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses