CVE-2026-20022 — Use of Out-of-range Pointer Offset in Cisco Secure Firewall Adaptive Security Appliance Software
CWE-823 — Use of Out-of-range Pointer OffsetCWE-119 — Improper Restriction of Operations within the Bounds of a Memory BufferCWE-190 — Integer Overflow or WraparoundCWE-20 — Improper Input ValidationCWE-401 — Missing Release of Memory after Effective LifetimeCWE-787 — Out-of-bounds Write4 documents4 sources
Severity
6.1MEDIUMNVD
EPSS
0.0%
top 95.10%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMar 4
Description
A vulnerability in the OSPF protocol of Cisco Secure Firewall ASA Software and Cisco Secure FTD Software could allow an unauthenticated, adjacent attacker to cause an affected device to reload unexpectedly, resulting in a DoS condition when OSPF canonicalization debug is enabled by using the command debug ip ospf canon.
This vulnerability is due to insufficient input validation when processing OSPF LSU packets. An attacker could exploit this vulnerability by sending crafted unauthenticated OSPF …
CVSS vector
CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:HExploitability: 1.6 | Impact: 4.0
Affected Packages2 packages
🔴Vulnerability Details
2GHSA▶
GHSA-99cr-qjpc-34g3: A vulnerability in the OSPF protocol of Cisco Secure Firewall ASA Software and Cisco Secure FTD Software could allow an unauthenticated, adjacent atta↗2026-03-04
CVEList▶
CVE-2026-20022: A vulnerability in the OSPF protocol of Cisco Secure Firewall ASA Software and Cisco Secure FTD Software could allow an unauthenticated, adjacent atta↗2026-03-04
📋Vendor Advisories
1Cisco▶
Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software OSPF Protocol Vulnerabilities↗2026-03-04