[CIVN-2026-0161] Cisco IOS XE Software TLS Memory Exhaustion Denial of Service Vulnerability

By Published On: April 2, 2026

—–BEGIN PGP SIGNED MESSAGE—–

Hash: SHA256


Cisco IOS XE Software TLS Memory Exhaustion Denial of Service Vulnerability


Indian – Computer Emergency Response Team (https://www.cert-in.org.in)


Severity Rating: HIGH


Software Affected


Cisco IOS XE Software

Overview


A vulnerability has been reported in TLS library of Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to exhaust the available memory of an affected device.


Target Audience: 

All IT administrators and individuals responsible for maintaining and updating in Software.


Risk Assessment:

High risk of data manipulation and service disruption.


Impact Assessment:

Potential impact on confidentiality, integrity, and availability of the system.


Description


This vulnerability exists due to improper management of memory resources during TLS connection setup. An attacker could exploit this vulnerability by repeatedly triggering the conditions that cause the memory increase.


Successful exploitation of this vulnerability could allow the attacker to exhaust the available memory on an affected device, resulting in an unexpected reload and a denial of service (DoS) condition.


Solution


Apply appropriate updates as mentioned in Cisco Advisory

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-tls-dos-TVgLDEZL



Vendor Information


CISCO

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-tls-dos-TVgLDEZL


References


CISCO

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-tls-dos-TVgLDEZL


CVE Name

CVE-2026-20004




– —


Thanks and Regards,

CERT-In


Incident Response Help Desk

e-mail: incident@cert-in.org.in

Phone: +91-11-22902657

Toll Free Number: 1800-11-4949

Toll Free Fax : 1800-11-6969

Web: http://www.cert-in.org.in

PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4

PGP Key information:

https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS


Postal address:

Indian Computer Emergency Response Team (CERT-In)

Ministry of Electronics and Information Technology

Government of India

Electronics Niketan

6, C.G.O. Complex

New Delhi-110 003

—–BEGIN PGP SIGNATURE—–


iQIzBAEBCAAdFiEE6r4Iam/Ey0c/KakL3jCgcSdcys8FAmnOgUcACgkQ3jCgcSdc

ys/RLA//W8yMci0xT5eUy00Lq607X5PEtuMKXmcAxPr+DuFdpqCcW4550s0Bezox

HK/ipA+9d2CJhU9h4b0REwAa1iFAZ7eLPtWdOpDSHmDtq/U+SrCZOTB/ftzQSoKM

OtP2cOugywlf0TEiniyRfS1Q/MGkDxbHV43WwCItIt/Rfjv8pCJp3ASKLutyhdm1

JMfLgnNFd51p8mpMM8ZlwN53QvqT7KevrgIFj7HX4WTkUPkiFM8efwLUY59itkZr

R8Zg11wznvOxWOtDAk8zxt61Gb95Sn7DD+AKB0S1NjwgHVeLeCq4kx/Pr6vOwJfi

CditYTA3A2HWmwIhbJnYfLoHxockj5Xv2wvbmq0ZxK+GO8CL6qpmncI+jxNAEMTG

QEPmFl8OhIeQejBHKMNZ3bNbyL+QwDLHcTKjphS2+kODo1FhmbC4lSR3LmLDNRIE

AUsTUO5ORj5WgdRmYoUPZtc8iE63jPxhZDkcrfhZJjyvH5/Ye65xeNQTYKDwO5OF

CsswbBt4aKmWNyjcPFQF24q5v+7HXI+LCa+FMhalrUwFuQ7D9xvT4gTaq+0j2tpO

9fj7ySczfvSogKkqTRkTaLob4ImMwArMldohYHztbteuxL4yV/dOpc3V6ky9hx9b

38KWX6JfnzCU5DJpwTUEY83dE6hbkT0jDR+77VKNQG2dCif8tHk=

=5MRh

—–END PGP SIGNATURE—–

Share this article