CVE-2026-20025 — Integer Overflow or Wraparound in Cisco Secure Firewall Adaptive Security Appliance Software
CWE-190 — Integer Overflow or WraparoundCWE-119 — Improper Restriction of Operations within the Bounds of a Memory BufferCWE-20 — Improper Input ValidationCWE-401 — Missing Release of Memory after Effective LifetimeCWE-787 — Out-of-bounds WriteCWE-823 — Use of Out-of-range Pointer Offset4 documents4 sources
Severity
6.8MEDIUMNVD
EPSS
0.0%
top 87.24%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMar 4
Description
A vulnerability in the OSPF protocol of Cisco Secure Firewall ASA Software and Cisco Secure FTD Software could allow an authenticated, adjacent attacker to cause an affected device to reload unexpectedly, resulting in a DoS condition. To exploit this vulnerability, the attacker must have the OSPF secret key.
This vulnerability is due to insufficient input validation when processing OSPF link-state update (LSU) packets. An attacker could exploit this vulnerability by sending crafted OSPF LSU pack…
CVSS vector
CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:HExploitability: 2.3 | Impact: 4.0
Affected Packages2 packages
🔴Vulnerability Details
2CVEList▶
CVE-2026-20025: A vulnerability in the OSPF protocol of Cisco Secure Firewall ASA Software and Cisco Secure FTD Software could allow an authenticated, adjacent attack↗2026-03-04
GHSA▶
GHSA-v9vp-c2f8-43hh: A vulnerability in the OSPF protocol of Cisco Secure Firewall ASA Software and Cisco Secure FTD Software could allow an authenticated, adjacent attack↗2026-03-04
📋Vendor Advisories
1Cisco▶
Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software OSPF Protocol Vulnerabilities↗2026-03-04