[CIVN-2026-0123] Denial of Service vulnerabilities in CISCO

By Published On: March 10, 2026

—–BEGIN PGP SIGNED MESSAGE—–

Hash: SHA256


Denial of Service vulnerabilities in CISCO


Indian – Computer Emergency Response Team (https://www.cert-in.org.in)


Severity Rating: HIGH


Software Affected


Cisco Secure Firewall ASA Software 

Secure FTD Software

Overview


Multiple vulnerabilities have been reported in Cisco Secure Firewall ASA and FTD software, affecting IKEv2 and GCM‑encrypted IPsec processing which could allow a remote attacker by sending crafted packets to Exhaust memory or system resources, Cause device reloads or crashes, denial-of-service (DoS) conditions on targeted device.


Target Audience: 

All IT administrators and individuals responsible for maintaining and updating in Software.


Risk Assessment:

High risk of data manipulation and service disruption.


Impact Assessment:

Potential impact on confidentiality, integrity, and availability of the system.


Description


Multiple vulnerabilities exist in Cisco Secure Firewall ASA Software and Secure FTD Software due to improper handling of IKEv2 packets, memory leaks, failure to free memory during packet processing, and insufficient memory allocation for GCM-encrypted IPsec traffic. An attacker could exploit these issues by sending specially crafted IKEv2 or GCM-encrypted IPsec packets to an affected device, potentially exhausting memory or system resources.


Successful exploitation of these vulnerabilities  result in device reloads, crashes, or denial-of-service conditions.


Solution


Apply appropriate updates as mentioned in Cisco Advisory

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-ikev2-dos-eBueGdEG


https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-esp-dos-uv7yD8P5



Vendor Information


CISCO

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-ikev2-dos-eBueGdEG

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-esp-dos-uv7yD8P5


References


CISCO

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-ikev2-dos-eBueGdEG

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-esp-dos-uv7yD8P5


CVE Name

CVE-2026-20014

CVE-2026-20013

CVE-2026-20015

CVE-2026-20049




– —


Thanks and Regards,

CERT-In


Incident Response Help Desk

e-mail: incident@cert-in.org.in

Phone: +91-11-22902657

Toll Free Number: 1800-11-4949

Toll Free Fax : 1800-11-6969

Web: http://www.cert-in.org.in

PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4

PGP Key information:

https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS


Postal address:

Indian Computer Emergency Response Team (CERT-In)

Ministry of Electronics and Information Technology

Government of India

Electronics Niketan

6, C.G.O. Complex

New Delhi-110 003

—–BEGIN PGP SIGNATURE—–


iQIzBAEBCAAdFiEE6r4Iam/Ey0c/KakL3jCgcSdcys8FAmmwF8gACgkQ3jCgcSdc

ys/GfhAAggF4FJ/MAkUHP/8/mF3+zNfpFgXqHKIWj/Z+YyLA9doQG2x1RCFcuvda

Q26TNgKW4qK8S0jwau33LolI7fd7DZSdRxJdNYWTPAJ9Y6LuPTvuBOEIz0o8ZZnz

6mz/GLhOlnSJHBjQOoUYsq6s1xmi6evwUlP7rN58dkoxvNJxsxpNHeBJYMj6zOqY

h1ZjYm3xCCoAccI+t7NoadlWzB0IJsdEsnCPKctFybmJnjPmsnV+pY0jhEFDoKo5

Dlbz+i/IPz5ov2nWEwtHaQ6MQ9sEGojtLMdcoN3akc9n5SvjAAb8fPP5AD3FLRwE

KJiTkdP9w1kbcoZBxv9zGiIoK/qra+EekUqT5WHfHldXuUI4FGV7fXq+YPoynbiQ

PRKAnTMimS7kOamtYcmslk+WsCCkKM/9QQFXWNIxKfRpfD8W71+qNrvm/xYk9XsV

TOuaPQZ8vYRukKJBrSaGgljZsO6K3qgb/LcWmPyf5K/c5CQmh8Nww+iryDM1N53J

I9JgKHBw3I4gQG7B2gzx4MH0cut2OKm1yxvDnKiePgmjlYrJ7bG+pWO8cwhr63tU

KIiKHLkIc/2ACMO1UjkzFDdf2EuM7ipuVwAxYxutzLQQmSIvfyYCF5TEJhMikMmA

2yha3FbcHUmEOlqb4QqZ8aFh/Zi4U+x+Mmf1m5SIpVmZ4y2omlk=

=sauE

—–END PGP SIGNATURE—–

Share this article