CVE-2026-20105

Cisco · Secure Firewall ASA and FTD Software

An authenticated remote attacker with valid VPN credentials can exhaust device memory on Cisco ASA and FTD systems, leading to a Denial of Service for new SSL VPN connections.

Executive summary

A vulnerability in Cisco Secure Firewalls allows authenticated VPN users to trigger memory exhaustion, effectively blocking all subsequent remote access attempts to the network.

Vulnerability

This vulnerability affects the Remote Access SSL VPN functionality. An authenticated, remote attacker with a valid VPN connection can perform actions that lead to the exhaustion of device memory, resulting in a Denial of Service (DoS) for all new incoming VPN connections.

Business impact

The CVSS score of 7.7 indicates a High-severity risk to availability. By exhausting system memory, an attacker can prevent legitimate employees from establishing new secure connections, paralyzing remote operations. This type of attack is particularly damaging as it may persist until the device is manually cleared or rebooted, impacting productivity and incident response.

Remediation

Immediate Action: Deploy the recommended security updates from Cisco to all affected ASA and FTD appliances immediately.

Proactive Monitoring: Implement granular monitoring of memory pools on firewall devices and configure SNMP traps to alert administrators when memory utilization exceeds 80%.

Compensating Controls: Use strict egress filtering and session limits per user to mitigate the speed and scale at which an authenticated attacker can consume system resources.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Immediate patching is recommended to maintain the integrity of remote access services. Administrators should prioritize these updates to ensure that a single compromised account cannot be used to deny service to the entire organization. Regular audits of VPN user accounts and permissions are also advised.