Description
A vulnerability in the OSPF protocol of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, adjacent attacker to corrupt memory on an affected device, resulting in a denial of service (DoS) condition.

This vulnerability is due to memory corruption when parsing OSPF protocol packets. An attacker could exploit this vulnerability by sending crafted OSPF packets to an affected device. A successful exploit could allow the attacker to cause memory corruption causing the affected device to reboot, resulting in a DoS condition.
Published: 2026-03-04
Score: 6.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Patch
AI Analysis

Impact

The vulnerability originates from improper handling of OSPF protocol packets, leading to memory corruption. An attacker can send crafted packets from an adjacent network, causing the system to overwrite critical memory areas. The resulting crash forces the device to reboot, which renders the firewall inactive and results in a denial of service. The weakness is classified as CWE-787, indicating an out‑of‑bounds write.

Affected Systems

The affected systems are Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software. No specific product versions are listed in the advisory, so all instances of the listed systems that may still contain the vulnerability should be considered at risk.

Risk and Exploitability

The vulnerability’s CVSS score of 6.1 indicates moderate severity. The EPSS score is less than 1 %, showing a very low probability of exploitation in the wild, and it is not listed in the CISA KEV catalog. The attacker runs unauthenticated and relies on being adjacent to the target device, which limits the attack surface to local or immediate network zones. Because of the low exploitation likelihood, the risk is moderate, but any successful exploit results in complete denial of service for the affected device.

Generated by OpenCVE AI on April 16, 2026 at 13:12 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Cisco firmware update that addresses the OSPF packet parsing flaw.
  • Restrict OSPF adjacency by configuring base network segmentation or by disabling OSPF on interfaces that do not need it.
  • Monitor for abnormal OSPF packet activity and device reboot events to detect any exploitation attempts.

Generated by OpenCVE AI on April 16, 2026 at 13:12 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 16 Apr 2026 13:30:00 +0000

Type Values Removed Values Added
Title Memory Corruption in OSPF Parsing Leads to Denial of Service

Thu, 05 Mar 2026 09:15:00 +0000

Type Values Removed Values Added
First Time appeared Cisco
Cisco adaptive Security Appliance Software
Cisco secure Firewall Threat Defense
Vendors & Products Cisco
Cisco adaptive Security Appliance Software
Cisco secure Firewall Threat Defense

Wed, 04 Mar 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 04 Mar 2026 19:00:00 +0000

Type Values Removed Values Added
Description A vulnerability in the OSPF protocol of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, adjacent attacker to corrupt memory on an affected device, resulting in a denial of service (DoS) condition. This vulnerability is due to memory corruption when parsing OSPF protocol packets. An attacker could exploit this vulnerability by sending crafted OSPF packets to an affected device. A successful exploit could allow the attacker to cause memory corruption causing the affected device to reboot, resulting in a DoS condition.
Weaknesses CWE-787
References
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H'}


Subscriptions

Cisco Adaptive Security Appliance Software Secure Firewall Threat Defense
cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2026-03-04T21:34:39.881Z

Reserved: 2025-10-08T11:59:15.352Z

Link: CVE-2026-20023

cve-icon Vulnrichment

Updated: 2026-03-04T21:34:36.628Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-04T19:16:14.627

Modified: 2026-03-05T19:39:11.967

Link: CVE-2026-20023

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T13:15:06Z

Weaknesses