OSPF Protocol Vulnerability in Cisco Secure Firewall ASA and FTD Software
CVE-2026-20022

6.1MEDIUM

What is CVE-2026-20022?

A vulnerability in the OSPF protocol of Cisco Secure Firewall ASA and FTD Software enables an attacker to cause an affected device to unexpectedly reload, leading to a denial of service. This issue arises from inadequate input validation in processing OSPF Link State Update (LSU) packets. An adversary could exploit this by sending specially crafted, unauthenticated OSPF packets. Successful exploitation leads to writing to memory outside of the intended packet data, consequently causing a device reload and resulting in service disruption.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

Cisco Secure Firewall Adaptive Security Appliance (ASA) Software 9.12.1

Cisco Secure Firewall Adaptive Security Appliance (ASA) Software 9.12.1.2

Cisco Secure Firewall Adaptive Security Appliance (ASA) Software 9.12.1.3

References

CVSS V3.1

Score:
6.1
Severity:
MEDIUM
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Adjacent Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Changed

Timeline

  • ๐Ÿ‘พ

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

.