Impact
A flaw in how Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Threat Defense (FTD) Software validate OSPF link‑state update packets allows an authenticated adjacent attacker who possesses the OSPF secret key to craft packets that corrupt the device’s heap, causing it to reload unexpectedly and create a denial‑of‑service condition. This vulnerability maps to integer or buffer overflow weaknesses (CWE‑190) and affects only the availability of the firewall or threat defense device.
Affected Systems
Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software are impacted. The advisory does not disclose specific vulnerable version numbers.
Risk and Exploitability
The vulnerability rates a CVSS base score of 6.8, indicating medium severity. EPSS is below 1 %, implying a very low but realistic exploitation probability. It is not listed in CISA’s KEV catalog, so no confirmed production exploits are known. An attacker must be authenticated on the data‑plane border, possess the OSPF secret key, and send crafted OSPF LSU packets over an adjacent interface to trigger a forced reload and a temporary denial of service.
OpenCVE Enrichment