Impact
An unauthenticated remote attacker can send specially crafted IKEv2 packets to a Cisco Secure Firewall ASA or FTD device, causing memory not to be freed during packet processing. The resulting memory exhaustion can exhaust device resources and trigger a DoS condition that ultimately requires a manual reload. The impact is limited to availability of the targeted firewall and may extend to services on downstream network devices if the firewall becomes unresponsive.
Affected Systems
Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software. No specific affected versions are listed in the advisory; users should verify firmware download dates or consult the Cisco Security Advisory referenced for details.
Risk and Exploitability
The CVSS score of 5.8 indicates moderate severity; the EPSS score of less than 1% suggests a very low exploitation probability at the time of this analysis. The vulnerability is not listed in the CISA KEV catalog. The attack vector is remote over the network, requiring no authentication and an attacker must be able to reach the device's IKEv2 interface.
OpenCVE Enrichment