Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
8.6

Cisco ASA Software Drops Incoming TCP Connections Under Heavy Traffic

CVE-2026-20082
Summary

A flaw in Cisco ASA Software causes it to incorrectly drop incoming connections under heavy traffic. This could allow an attacker to prevent users from accessing the firewall, including remote management and VPN connections, effectively taking the device offline. Update your ASA Software to fix this issue.

Original title
A vulnerability in the handling of the embryonic connection limits in Cisco Secure Firewall Adaptive Security Appliance (ASA) Software could allow an unauthenticated, remote attacker to cause incom...
Original description
A vulnerability in the handling of the embryonic connection limits in Cisco Secure Firewall Adaptive Security Appliance (ASA) Software could allow an unauthenticated, remote attacker to cause incoming TCP SYN packets to be dropped incorrectly.

This vulnerability is due to improper handling of new, incoming TCP connections that are destined to management or data interfaces when the device is under a TCP SYN flood attack. An attacker could exploit this vulnerability by sending a crafted stream of traffic to an affected device. A successful exploit could allow the attacker to prevent all incoming TCP connections to the device from being established, including remote management access, Remote Access VPN (RAVPN) connections, and all network protocols that are TCP-based. This results in a denial of service (DoS) condition for affected features.
nvd CVSS3.1 8.6
Vulnerability type
CWE-772
Published: 4 Mar 2026 · Updated: 13 Mar 2026 · First seen: 6 Mar 2026