PT-2026-27788 · Cisco · Cisco Secure Firewall Threat Defense (Ftd)+3
Published
2026-03-25
·
Updated
2026-03-25
·
CVE-2026-20012
CVSS v3.1
8.6
High
| AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H |
Name of the Vulnerable Software and Affected Versions
Cisco IOS Software (affected versions not specified)
Cisco IOS XE Software (affected versions not specified)
Cisco Secure Firewall Adaptive Security Appliance (ASA) Software (affected versions not specified)
Cisco Secure Firewall Threat Defense (FTD) Software (affected versions not specified)
Description
A flaw exists in the Internet Key Exchange version 2 (IKEv2) feature that may allow a remote attacker to cause a denial of service (DoS) condition. This is due to improper parsing of IKEv2 packets. An attacker could exploit this by sending crafted IKEv2 packets to an affected device. Successful exploitation of Cisco IOS Software and IOS XE Software could cause the device to reload, resulting in a DoS condition. Successful exploitation of Cisco Secure Firewall ASA Software and Secure FTD Software could lead to partial system memory exhaustion, causing instability, such as the inability to establish new IKEv2 VPN sessions. A manual reboot of the device is required to recover.
Recommendations
At the moment, there is no information about a newer version that contains a fix for this vulnerability.
Memory Leak
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Cisco Ios
Cisco Ios Xe
Cisco Secure Firewall Adaptive Security Appliance (Asa)
Cisco Secure Firewall Threat Defense (Ftd)