CVE-2026-20049

Cisco · Adaptive Security Appliance (ASA) / Threat Defense (FTD)

A vulnerability in GCM-encrypted IKEv2 IPsec traffic processing in Cisco ASA and FTD software allows authenticated remote attackers to cause a denial of service.

Executive summary

An authenticated remote attacker can trigger a denial of service (DoS) condition on Cisco ASA and FTD devices by exploiting a flaw in the processing of specific IPsec traffic.

Vulnerability

The vulnerability exists in the way the software processes Galois/Counter Mode (GCM)-encrypted Internet Key Exchange version 2 (IKEv2) IPsec traffic. An authenticated, remote attacker can exploit this by sending crafted traffic, leading to a system crash and a denial of service (DoS) condition.

Business impact

With a CVSS score of 7.7, this is a High-severity vulnerability. While it requires authentication, a successful exploit can take down critical VPN and firewall services, leading to significant operational disruption and loss of remote connectivity for the entire organization. This impact on availability can be costly during peak business hours.

Remediation

Immediate Action: Apply the security updates provided by Cisco for ASA and FTD software to resolve the IKEv2 processing issue.

Proactive Monitoring: Monitor for frequent, unexplained reboots of the firewall and review IKEv2 negotiation logs for unusual patterns or errors originating from authenticated users.

Compensating Controls: Implement strict peer authentication for IPsec tunnels and limit the number of users with the permissions required to establish GCM-encrypted IKEv2 sessions.

Exploitation status

Public Exploit Available: false

Analyst recommendation

We recommend applying the vendor-supplied patches during the next scheduled maintenance window, or immediately if the firewall is critical for remote access. Ensuring that only trusted individuals have the credentials to establish IPsec sessions is a vital secondary defense.