Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
6.1
Cisco Firewalls Can Crash with Malicious OSPF Packets
CVE-2026-20022
Summary
The OSPF feature on Cisco Firewalls can be tricked into crashing by an attacker sending special packets, which can cause the firewall to shut down temporarily. This can happen if a specific debug mode is enabled. It's essential to disable the debug mode or upgrade the firewall software to prevent this issue.
Original title
A vulnerability in the OSPF protocol of Cisco Secure Firewall ASA Software and Cisco Secure FTD Software could allow an unauthenticated, adjacent attacker to cause an affected device to reload unex...
Original description
A vulnerability in the OSPF protocol of Cisco Secure Firewall ASA Software and Cisco Secure FTD Software could allow an unauthenticated, adjacent attacker to cause an affected device to reload unexpectedly, resulting in a DoS condition when OSPF canonicalization debug is enabled by using the command debug ip ospf canon.
This vulnerability is due to insufficient input validation when processing OSPF LSU packets. An attacker could exploit this vulnerability by sending crafted unauthenticated OSPF packets. A successful exploit could allow the attacker to write to memory outside of the packet data, causing the device to reload, resulting in a DoS condition.
This vulnerability is due to insufficient input validation when processing OSPF LSU packets. An attacker could exploit this vulnerability by sending crafted unauthenticated OSPF packets. A successful exploit could allow the attacker to write to memory outside of the packet data, causing the device to reload, resulting in a DoS condition.
nvd CVSS3.1
6.1
Vulnerability type
CWE-823
Published: 4 Mar 2026 · Updated: 13 Mar 2026 · First seen: 6 Mar 2026