CVE-2026-20023

medium

Description

A vulnerability in the OSPF protocol of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, adjacent attacker to corrupt memory on an affected device, resulting in a denial of service (DoS) condition. This vulnerability is due to memory corruption when parsing OSPF protocol packets. An attacker could exploit this vulnerability by sending crafted OSPF packets to an affected device. A successful exploit could allow the attacker to cause memory corruption causing the affected device to reboot, resulting in a DoS condition.

References

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-ospf-ZH8PhbSW

Details

Source: Mitre, NVD

Published: 2026-03-04

Updated: 2026-03-04

Risk Information

CVSS v2

Base Score: 4.6

Vector: CVSS2#AV:A/AC:H/Au:N/C:N/I:N/A:C

Severity: Medium

CVSS v3

Base Score: 6.1

Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H

Severity: Medium