Description
A vulnerability in the TLS cryptography functionality of the Snort 3 Detection Engine of Cisco Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause the Snort 3 Detection Engine to unexpectedly restart, resulting in a denial of service (DoS) condition.

This vulnerability is due to improper implementation of the TLS protocol. An attacker could exploit this vulnerability by sending a crafted TLS packet to an affected system. A successful exploit could allow the attacker to cause a device that is running Cisco Secure FTD Software to drop network traffic, resulting in a DoS condition. 
Note: TLS 1.3 is not affected by this vulnerability.
Published: 2026-03-04
Score: 5.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Patch Now
AI Analysis

Impact

A flaw in the TLS cryptography implementation of the Snort 3 Detection Engine within Cisco Secure Firewall Threat Defense (FTD) Software enables an attacker to send a specially crafted TLS packet, causing the engine to unexpectedly restart. The resulting restart forces the device to drop network traffic, creating a denial of service condition. The weakness is classified as CWE‑388, an insecure interface or protocol vulnerability that can lead to service disruption.

Affected Systems

Cisco Secure Firewall Threat Defense (FTD) Software is impacted. No specific product versions are listed in the advisory; therefore, all currently deployed FTD instances are potentially vulnerable unless documented otherwise by the vendor.

Risk and Exploitability

The vulnerability carries a CVSS score of 5.8, indicating moderate severity, and an EPSS score below 1 %, implying a low likelihood of exploitation at present. The vulnerability is not present in Cisco’s Known Exploited Vulnerabilities catalog. Based on the description, the attack vector is remote and unauthenticated: an external actor can target the affected firewall by transmitting the crafted TLS packet over a network connection. Successful exploitation would cause the Snort 3 engine to restart, leading to a denial of service that affects all traffic processed by the device.

Generated by OpenCVE AI on April 16, 2026 at 13:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Install the latest Cisco Secure Firewall Threat Defense (FTD) Software that contains the TLS handling fix as described in the Cisco advisory.
  • If a patch is not immediately available, restart the Snort 3 Detection Engine or reboot the device to clear any abnormal state and restore service.
  • Configure firewall rules or packet filters to limit or block suspicious TLS traffic until the software update is applied, reducing the exposure surface of the vulnerability.

Generated by OpenCVE AI on April 16, 2026 at 13:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 05 Mar 2026 09:15:00 +0000

Type Values Removed Values Added
First Time appeared Cisco
Cisco secure Firewall Threat Defense
Vendors & Products Cisco
Cisco secure Firewall Threat Defense

Wed, 04 Mar 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 04 Mar 2026 17:45:00 +0000

Type Values Removed Values Added
Description A vulnerability in the TLS cryptography functionality of the Snort 3 Detection Engine of Cisco Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause the Snort 3 Detection Engine to unexpectedly restart, resulting in a denial of service (DoS) condition. This vulnerability is due to improper implementation of the TLS protocol. An attacker could exploit this vulnerability by sending a crafted TLS packet to an affected system. A successful exploit could allow the attacker to cause a device that is running Cisco Secure FTD Software to drop network traffic, resulting in a DoS condition.&nbsp; Note: TLS 1.3 is not affected by this vulnerability.
Title Cisco Firepower Threat Defense Software and Cisco FirePOWER Services TLS with Snort 3 Denial of Service Vulnerability
Weaknesses CWE-388
References
Metrics cvssV3_1

{'score': 5.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L'}


Subscriptions

Cisco Secure Firewall Threat Defense
cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2026-03-04T20:51:58.937Z

Reserved: 2025-10-08T11:59:15.349Z

Link: CVE-2026-20006

cve-icon Vulnrichment

Updated: 2026-03-04T20:51:55.949Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-04T18:16:13.803

Modified: 2026-03-05T19:39:11.967

Link: CVE-2026-20006

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T13:30:16Z

Weaknesses