Description
A vulnerability in the Remote Access SSL VPN functionality of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to exhaust device memory resulting in a denial of service (DoS) condition to new Remote Access SSL VPN connections. This does not affect the management interface, though it may become temporarily unresponsive.

This vulnerability is due to trusting user input without validation. An attacker could exploit this vulnerability by sending crafted packets to the Remote Access SSL VPN server. A successful exploit could allow the attacker to cause the device web interface to stop responding, resulting in a DoS condition.
Published: 2026-03-04
Score: 8.6 High
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service via SSL VPN memory exhaustion
Action: Apply Patch
AI Analysis

Impact

A flaw in Cisco Secure Firewall’s Remote Access SSL VPN service trusts user input without validation, allowing an attacker to send crafted packets that exhaust device memory. The result is a denial of service that affects new VPN connections and may cause the device web interface to become temporarily unresponsive, while the management interface itself is not directly impacted.

Affected Systems

Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software are the impacted products. No specific affected firmware versions are listed in the vendor advisory; administrators should verify the version of the deployed device against the advisory.

Risk and Exploitability

The CVSS score of 8.6 classifies the vulnerability as high severity. The EPSS score is below 1%, indicating a low to moderate likelihood of public exploitation, though the device remains exposed to remote attackers that can reach the VPN service. The attack is inferred to be remote, unauthenticated, and leveraging the exposed SSL VPN port. Successful exploitation leads to memory exhaustion, DoS of the VPN service, and potential degradation of the web interface, hindering administrative access.

Generated by OpenCVE AI on April 16, 2026 at 13:26 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Download and apply the firmware update or patch listed in the Cisco Security Advisory to address the SSL VPN input validation issue.
  • If a timely patch is unavailable, restrict VPN access by limiting the user base or disabling the SSL VPN service entirely if it is not required for operations.
  • Implement monitoring of VPN traffic and consider rate limiting or blocking unexpected packet patterns to mitigate exploitation attempts until a full patch is deployed.

Generated by OpenCVE AI on April 16, 2026 at 13:26 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 16 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Cisco firepower Threat Defense Software
CPEs cpe:2.3:a:cisco:firepower_threat_defense_software:*:*:*:*:*:*:*:*
cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*
Vendors & Products Cisco firepower Threat Defense Software

Thu, 05 Mar 2026 09:15:00 +0000

Type Values Removed Values Added
First Time appeared Cisco
Cisco adaptive Security Appliance Software
Cisco secure Firewall Threat Defense
Vendors & Products Cisco
Cisco adaptive Security Appliance Software
Cisco secure Firewall Threat Defense

Wed, 04 Mar 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 04 Mar 2026 17:30:00 +0000

Type Values Removed Values Added
Description A vulnerability in the Remote Access SSL VPN functionality of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to exhaust device memory resulting in a denial of service (DoS) condition to new Remote Access SSL VPN connections. This does not affect the management interface, though it may become temporarily unresponsive. This vulnerability is due to trusting user input without validation. An attacker could exploit this vulnerability by sending crafted packets to the Remote Access SSL VPN server. A successful exploit could allow the attacker to cause the device web interface to stop responding, resulting in a DoS condition.
Weaknesses CWE-770
References
Metrics cvssV3_1

{'score': 8.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H'}


Subscriptions

Cisco Adaptive Security Appliance Software Firepower Threat Defense Software Secure Firewall Threat Defense
cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2026-03-04T21:36:10.914Z

Reserved: 2025-10-08T11:59:15.371Z

Link: CVE-2026-20103

cve-icon Vulnrichment

Updated: 2026-03-04T21:36:00.704Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-04T18:16:25.840

Modified: 2026-04-16T20:28:00.410

Link: CVE-2026-20103

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T13:30:16Z

Weaknesses