OSPF Protocol Vulnerability in Cisco Secure Firewall ASA and FTD Software
CVE-2026-20025

6.8MEDIUM

What is CVE-2026-20025?

A vulnerability exists in the OSPF protocol of Cisco Secure Firewall ASA and FTD Software, allowing an authenticated adjacent attacker to craft specific OSPF link-state update packets. When these packets are sent, they can exploit insufficient input validation, potentially corrupting the heap memory of the device. This exploitation causes the device to unexpectedly reload, leading to a denial of service condition. Successful exploitation requires knowledge of the OSPF secret key, which heightens the risk profile for devices using affected versions.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

Cisco Secure Firewall Adaptive Security Appliance (ASA) Software 9.12.1

Cisco Secure Firewall Adaptive Security Appliance (ASA) Software 9.12.1.2

Cisco Secure Firewall Adaptive Security Appliance (ASA) Software 9.12.1.3

References

CVSS V3.1

Score:
6.8
Severity:
MEDIUM
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Changed

Timeline

  • ๐Ÿ‘พ

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

.