Description
A vulnerability in the OSPF protocol of Cisco Secure Firewall ASA Software and Cisco Secure FTD Software could allow an unauthenticated, adjacent attacker to cause an affected device to reload unexpectedly, resulting in a DoS condition. If OSPF authentication is enabled, the attacker must know the secret key to exploit this vulnerability.

This vulnerability is due to insufficient input validation when processing OSPF update packets. An attacker could exploit this vulnerability by sending crafted OSPF update packets. A successful exploit could allow the attacker to create a buffer overflow, causing the affected device to reload, resulting in a DoS condition.
Published: 2026-03-04
Score: 6.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service (device reload)
Action: Patch
AI Analysis

Impact

The flaw is in the handling of OSPF update packets in Cisco Secure Firewall ASA and FTD software. Insufficient input validation can trigger a buffer overflow when a maliciously crafted update packet is received. The overflow causes the device to reload, leading to an interruption of firewall services. This is a classic denial‑of‑service vulnerability that does not grant the attacker any additional privileges.

Affected Systems

Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software are affected. No specific version range is listed in the advisory, so all released versions prior to the published patch are presumed vulnerable.

Risk and Exploitability

The CVSS score of 6.8 marks it as moderately severe. The EPSS score is reported as less than 1% and the vulnerability is not included in CISA’s KEV catalog, indicating a low current exploitation probability. The attack requires the attacker to be on a network adjacent to the host and to send the crafted packet; authentication is not needed unless OSPF authentication is enabled, in which case the attacker must know the shared secret. The simple adjacent, unauthenticated nature of the vector, combined with the requirement for packet crafting, keeps exploitability moderate.

Generated by OpenCVE AI on April 16, 2026 at 13:14 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Cisco Secure Firewall ASA and FTD firmware patch that addresses the OSPF update processing flaw
  • Enable OSPF authentication to mitigate the risk by requiring a shared secret for update packets
  • Segment the firewall from adjacent devices or control its routing table to prevent unsolicited OSPF updates

Generated by OpenCVE AI on April 16, 2026 at 13:14 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 16 Apr 2026 13:30:00 +0000

Type Values Removed Values Added
Title OSPF Update Vulnerability Leading to Buffer Overflow and Device Reload

Thu, 05 Mar 2026 09:15:00 +0000

Type Values Removed Values Added
First Time appeared Cisco
Cisco adaptive Security Appliance Software
Cisco secure Firewall Threat Defense
Vendors & Products Cisco
Cisco adaptive Security Appliance Software
Cisco secure Firewall Threat Defense

Wed, 04 Mar 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 04 Mar 2026 19:00:00 +0000

Type Values Removed Values Added
Description A vulnerability in the OSPF protocol of Cisco Secure Firewall ASA Software and Cisco Secure FTD Software could allow an unauthenticated, adjacent attacker to cause an affected device to reload unexpectedly, resulting in a DoS condition. If OSPF authentication is enabled, the attacker must know the secret key to exploit this vulnerability. This vulnerability is due to insufficient input validation when processing OSPF update packets. An attacker could exploit this vulnerability by sending crafted OSPF update packets. A successful exploit could allow the attacker to create a buffer overflow, causing the affected device to reload, resulting in a DoS condition.
Weaknesses CWE-20
References
Metrics cvssV3_1

{'score': 6.8, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H'}


Subscriptions

Cisco Adaptive Security Appliance Software Secure Firewall Threat Defense
cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2026-03-04T21:32:02.375Z

Reserved: 2025-10-08T11:59:15.351Z

Link: CVE-2026-20020

cve-icon Vulnrichment

Updated: 2026-03-04T21:31:58.728Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-04T19:16:11.687

Modified: 2026-03-05T19:39:11.967

Link: CVE-2026-20020

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T13:15:06Z

Weaknesses