CVE-2026-20049

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
04/03/2026
Last modified:
16/04/2026

Description

A vulnerability in the processing of Galois/Counter Mode (GCM)-encrypted Internet Key Exchange version 2 (IKEv2) IPsec traffic of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an authenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.<br /> <br /> This vulnerability is due to the allocation of an insufficiently sized block of memory. An attacker could exploit this vulnerability by sending crafted GCM-encrypted IPsec traffic to an affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a DoS condition. To exploit this vulnerability, the attacker must have valid credentials to establish a VPN connection with the affected device.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:* 9.18.1 (including) 9.18.4.66 (excluding)
cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:* 9.19.1 (including) 9.20.3.20 (excluding)
cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:* 9.22.1.1 (including) 9.22.2.4 (excluding)
cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:* 9.23.1 (including) 9.23.1.3 (excluding)
cpe:2.3:a:cisco:firepower_threat_defense_software:*:*:*:*:*:*:*:* 7.2.0 (including) 7.2.11 (excluding)
cpe:2.3:a:cisco:firepower_threat_defense_software:*:*:*:*:*:*:*:* 7.3.0 (including) 7.4.3 (excluding)
cpe:2.3:a:cisco:firepower_threat_defense_software:*:*:*:*:*:*:*:* 7.6.0 (including) 7.6.4 (excluding)
cpe:2.3:a:cisco:firepower_threat_defense_software:*:*:*:*:*:*:*:* 7.7.0 (including) 7.7.10 (excluding)