Cisco IOS XE Software IKEv2 DoS (cisco-sa-asa-ftd-ios-dos-kPEpQGGK)

high Nessus Plugin ID 304813

Synopsis

The remote device is missing a vendor-supplied security patch.

Description

According to its self-reported version, Cisco IOS XE Software is affected by a vulnerability.

- A vulnerability in the Internet Key Exchange version 2 (IKEv2) feature of Cisco IOS XE Software could allow an unauthenticated, remote attacker to trigger a memory leak, resulting in a denial of service (DoS) condition on an affected device. This vulnerability is due to improper parsing of IKEv2 packets. An attacker could exploit this vulnerability by sending crafted IKEv2 packets to an affected device. A successful exploit could allow the attacker to partially exhaust system memory, resulting in system instability, such as the inability to establish new IKEv2 VPN sessions. A manual reboot of the device is required to recover from this condition. (CVE-2026-20012)

Please see the included Cisco BIDs and Cisco Security Advisory for more information.

Solution

Upgrade to the relevant fixed version referenced in Cisco bug IDs CSCwq01495, CSCwq01523

See Also

http://www.nessus.org/u?a5efb93f

http://www.nessus.org/u?b40d902b

https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwq01495

https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwq01523

Plugin Details

Severity: High

ID: 304813

File Name: cisco-sa-asa-ftd-ios-dos-kPEpQGGK-iosxe.nasl

Version: 1.1

Type: Combined

Family: CISCO

Published: 4/3/2026

Updated: 4/3/2026

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.2

CVSS v2

Risk Factor: High

Base Score: 7.8

Temporal Score: 5.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

CVSS Score Source: CVE-2026-20012

CVSS v3

Risk Factor: High

Base Score: 8.6

Temporal Score: 7.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:cisco:ios_xe

Required KB Items: Host/Cisco/IOS-XE/Version

Exploit Ease: No known exploits are available

Patch Publication Date: 3/25/2026

Vulnerability Publication Date: 3/25/2026

Reference Information

CVE: CVE-2026-20012

CWE: 401

CISCO-SA: cisco-sa-asa-ftd-ios-dos-kPEpQGGK

IAVA: 2026-A-0282

CISCO-BUG-ID: CSCwq01495, CSCwq01523