Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
7.7
Cisco Firewall Software: Remote DoS Attack Possible with Valid VPN Credentials
CVE-2026-20014
Summary
A vulnerability in Cisco Firewall Software's IKEv2 feature allows an attacker with valid VPN credentials to crash the device and disrupt network services. This can happen if an attacker sends special packets to the device. To protect your network, ensure you have the latest updates installed on your Cisco Firewall Software.
Original title
A vulnerability in the IKEv2 feature of Cisco Secure Firewall ASA Software and Cisco Secure FTD Software could allow an authenticated, remote attacker with valid VPN user credentials to cause a DoS...
Original description
A vulnerability in the IKEv2 feature of Cisco Secure Firewall ASA Software and Cisco Secure FTD Software could allow an authenticated, remote attacker with valid VPN user credentials to cause a DoS condition on an affected device that may also impact the availability of services to devices elsewhere in the network.
This vulnerability is due to the improper processing of IKEv2 packets. An attacker could exploit this vulnerability by sending crafted, authenticated IKEv2 packets to an affected device. A successful exploit could allow the attacker to exhaust memory, causing the device to reload.
This vulnerability is due to the improper processing of IKEv2 packets. An attacker could exploit this vulnerability by sending crafted, authenticated IKEv2 packets to an affected device. A successful exploit could allow the attacker to exhaust memory, causing the device to reload.
nvd CVSS3.1
7.7
Vulnerability type
CWE-401
Memory Leak
Published: 4 Mar 2026 · Updated: 13 Mar 2026 · First seen: 6 Mar 2026