Impact
A remote authenticated attacker who holds valid VPN user credentials can send specially crafted IKEv2 packets to an affected Cisco Secure Firewall device. The device’s improper handling of these packets causes memory exhaustion, forcing the system to reload. This denial of service disrupts not only the targeted firewall but can also impact the availability of services on other devices in the network. The underlying weakness is a memory leak, classified as CWE-401.
Affected Systems
Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software are the impacted products. No specific version information is provided in the advisory; any current installation is potentially vulnerable.
Risk and Exploitability
The vulnerability carries a CVSS score of 7.7, indicating a high severity. EPSS indicates a low exploitation probability (<1%), and the issue is not listed in the CISA KEV catalog. The likely attack vector is an authenticated remote user leveraging VPN access; exploitation requires the attacker to have valid credentials but does not demand additional privileged access.
OpenCVE Enrichment