CVE-2026-20100: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') in Cisco Cisco Secure Firewall Adaptive Security Appliance (ASA) Software
A vulnerability in the LUA interperter of the Remote Access SSL VPN feature of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Secure Firewall Threat Defense (FTD) Software could allow an authenticated, remote attacker with a valid VPN connection to cause the device to reload unexpectedly, resulting in a denial of service (DoS) condition. This does not affect the management or MUS interfaces. This vulnerability is due to trusting user input without validation in the LUA interprerter. An attacker could exploit this vulnerability by sending crafted HTTP packets to the Remote Access SSL VPN server. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.
CVE-2026-20100: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') in Cisco Cisco Secure Firewall Adaptive Security Appliance (ASA) Software
Description
A vulnerability in the LUA interperter of the Remote Access SSL VPN feature of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Secure Firewall Threat Defense (FTD) Software could allow an authenticated, remote attacker with a valid VPN connection to cause the device to reload unexpectedly, resulting in a denial of service (DoS) condition. This does not affect the management or MUS interfaces. This vulnerability is due to trusting user input without validation in the LUA interprerter. An attacker could exploit this vulnerability by sending crafted HTTP packets to the Remote Access SSL VPN server. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- cisco
- Date Reserved
- 2025-10-08T11:59:15.370Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69a86ce0d1a09e29cb4f155c
Added to database: 3/4/2026, 5:33:20 PM
Last updated: 3/4/2026, 5:34:10 PM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-26949: CWE-863: Incorrect Authorization in Dell Device Management Agent (DDMA)
MediumCVE-2026-20131: Deserialization of Untrusted Data in Cisco Cisco Secure Firewall Management Center (FMC)
CriticalCVE-2026-20106: Missing Release of Memory after Effective Lifetime in Cisco Cisco Secure Firewall Adaptive Security Appliance (ASA) Software
MediumCVE-2026-20105: Missing Release of Memory after Effective Lifetime in Cisco Cisco Secure Firewall Adaptive Security Appliance (ASA) Software
HighCVE-2026-20103: Allocation of Resources Without Limits or Throttling in Cisco Cisco Secure Firewall Adaptive Security Appliance (ASA) Software
HighActions
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.