Impact
An authenticated user on a network adjacent to the device can exploit a flaw in the OSPF protocol implementation on Cisco Secure Firewall appliances. The protocol fails to properly validate incoming OSPF packets, allowing an attacker to send crafted messages that cause the system to allocate memory uncontrollably. If the injection succeeds, the device exhausts its memory, leading to a service interruption or reboot.
Affected Systems
The vulnerability affects Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software. No specific version range is provided in the advisory, so all releases that use the affected OSPF implementation are potentially vulnerable.
Risk and Exploitability
The CVSS score of 4.3 indicates a low severity rating. The EPSS score of less than 1% reflects a very low likelihood of observed exploitation. The vulnerability is not listed in the CISA KEV catalog, suggesting it has not been widely abused. The exploit requires an authenticated attacker on an adjacent network who can send specially crafted OSPF packets; it does not rely on a public internet surface.
OpenCVE Enrichment