Impact
The vulnerability resides in the IKEv2 parsing logic of Cisco IOS, IOS XE, ASA, and FTD software, allowing an unauthenticated remote attacker to send crafted IKEv2 packets that trigger a memory leak. This leak can exhaust system memory, causing the device to become unstable or requiring a full reboot to recover. The weakness is an instance of improper resource management classified as CWE‑401, and the observable effect is a denial of service that disrupts VPN sessions and overall device availability.
Affected Systems
Cisco IOS, Cisco IOS XE, Cisco Secure Firewall Adaptive Security Appliance (ASA), and Cisco Secure Firewall Threat Defense (FTD) are affected. The advisory does not specify particular firmware releases; any build that implements IKEv2 on these platforms falls within the risk scope.
Risk and Exploitability
The CVSS score of 8.6 indicates high severity. EPSS data is not provided and the vulnerability is not listed in the CISA KEV catalog, suggesting no confirmed large‑scale exploitation yet. The attack vector is remote; an attacker transmits malformed IKEv2 packets over the network to the device. Exploitation requires no authentication and results in a denial of service that can only be resolved by a manual reboot or by applying a vendor patch.
OpenCVE Enrichment