
[CIVN-2026-0123] Denial of Service vulnerabilities in CISCO
—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
Denial of Service vulnerabilities in CISCO
Indian – Computer Emergency Response Team (https://www.cert-in.org.in)
Severity Rating: HIGH
Software Affected
Cisco Secure Firewall ASA Software
Secure FTD Software
Overview
Multiple vulnerabilities have been reported in Cisco Secure Firewall ASA and FTD software, affecting IKEv2 and GCM‑encrypted IPsec processing which could allow a remote attacker by sending crafted packets to Exhaust memory or system resources, Cause device reloads or crashes, denial-of-service (DoS) conditions on targeted device.
Target Audience:
All IT administrators and individuals responsible for maintaining and updating in Software.
Risk Assessment:
High risk of data manipulation and service disruption.
Impact Assessment:
Potential impact on confidentiality, integrity, and availability of the system.
Description
Multiple vulnerabilities exist in Cisco Secure Firewall ASA Software and Secure FTD Software due to improper handling of IKEv2 packets, memory leaks, failure to free memory during packet processing, and insufficient memory allocation for GCM-encrypted IPsec traffic. An attacker could exploit these issues by sending specially crafted IKEv2 or GCM-encrypted IPsec packets to an affected device, potentially exhausting memory or system resources.
Successful exploitation of these vulnerabilities result in device reloads, crashes, or denial-of-service conditions.
Solution
Apply appropriate updates as mentioned in Cisco Advisory
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-ikev2-dos-eBueGdEG
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-esp-dos-uv7yD8P5
Vendor Information
CISCO
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-ikev2-dos-eBueGdEG
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-esp-dos-uv7yD8P5
References
CISCO
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-ikev2-dos-eBueGdEG
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-esp-dos-uv7yD8P5
CVE Name
CVE-2026-20014
CVE-2026-20013
CVE-2026-20015
CVE-2026-20049
– —
Thanks and Regards,
CERT-In
Incident Response Help Desk
e-mail: incident@cert-in.org.in
Phone: +91-11-22902657
Toll Free Number: 1800-11-4949
Toll Free Fax : 1800-11-6969
Web: http://www.cert-in.org.in
PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4
PGP Key information:
https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS
Postal address:
Indian Computer Emergency Response Team (CERT-In)
Ministry of Electronics and Information Technology
Government of India
Electronics Niketan
6, C.G.O. Complex
New Delhi-110 003
—–BEGIN PGP SIGNATURE—–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=sauE
—–END PGP SIGNATURE—–


