{"api_version":"1","generated_at":"2026-04-23T01:19:48+00:00","cve":"CVE-2026-20014","urls":{"html":"https://cve.report/CVE-2026-20014","api":"https://cve.report/api/cve/CVE-2026-20014.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-20014","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-20014"},"summary":{"title":"CVE-2026-20014","description":"A vulnerability in the IKEv2 feature of Cisco Secure Firewall ASA Software and Cisco Secure FTD Software could allow an authenticated, remote attacker with valid VPN user credentials to cause a DoS condition on an affected device that may also impact the availability of services to devices elsewhere in the network.\r\n\r This vulnerability is due to the improper processing of IKEv2 packets. An attacker could exploit this vulnerability by sending crafted, authenticated IKEv2 packets to an affected device. A successful exploit could allow the attacker to exhaust memory, causing the device to reload.","state":"PUBLISHED","assigner":"cisco","published_at":"2026-03-04 18:16:15","updated_at":"2026-04-16 20:11:34"},"problem_types":["CWE-401","CWE-401 Missing Release of Memory after Effective Lifetime"],"metrics":[{"version":"3.1","source":"psirt@cisco.com","type":"Primary","score":"7.7","severity":"HIGH","vector":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H","baseScore":7.7,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"}},{"version":"3.1","source":"CNA","type":"CVSSV3_1","score":"7.7","severity":"HIGH","vector":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H","data":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":7.7,"baseSeverity":"HIGH","confidentialityImpact":"NONE","integrityImpact":"NONE","privilegesRequired":"LOW","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H","version":"3.1"}}],"references":[{"url":"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-ikev2-dos-eBueGdEG","name":"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-ikev2-dos-eBueGdEG","refsource":"psirt@cisco.com","tags":["Vendor Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-20014","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-20014","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"Cisco","product":"Cisco Secure Firewall Adaptive Security Appliance (ASA) Software","version":"affected 9.18.1","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Secure Firewall Adaptive Security Appliance (ASA) Software","version":"affected 9.18.1.3","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Secure Firewall Adaptive Security Appliance (ASA) Software","version":"affected 9.18.2","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Secure Firewall Adaptive Security Appliance (ASA) Software","version":"affected 9.18.2.5","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Secure Firewall Adaptive Security Appliance (ASA) Software","version":"affected 9.18.2.7","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Secure Firewall Adaptive Security Appliance (ASA) Software","version":"affected 9.18.2.8","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Secure Firewall Adaptive Security Appliance (ASA) Software","version":"affected 9.18.3","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Secure Firewall Adaptive Security Appliance (ASA) Software","version":"affected 9.18.3.39","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Secure Firewall Adaptive Security Appliance (ASA) Software","version":"affected 9.18.3.46","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Secure Firewall Adaptive Security Appliance (ASA) Software","version":"affected 9.18.3.53","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Secure Firewall Adaptive Security Appliance (ASA) Software","version":"affected 9.18.3.55","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Secure Firewall Adaptive Security Appliance (ASA) Software","version":"affected 9.18.3.56","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Secure Firewall Adaptive Security Appliance (ASA) Software","version":"affected 9.18.4","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Secure Firewall Adaptive Security Appliance (ASA) Software","version":"affected 9.18.4.5","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Secure Firewall Adaptive Security Appliance (ASA) Software","version":"affected 9.18.4.8","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Secure Firewall Adaptive Security Appliance (ASA) Software","version":"affected 9.18.4.22","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Secure Firewall Adaptive Security Appliance (ASA) Software","version":"affected 9.18.4.24","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Secure Firewall Adaptive Security Appliance (ASA) Software","version":"affected 9.18.4.29","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Secure Firewall Adaptive Security Appliance (ASA) Software","version":"affected 9.18.4.34","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Secure Firewall Adaptive Security Appliance (ASA) Software","version":"affected 9.18.4.40","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Secure Firewall Adaptive Security Appliance (ASA) Software","version":"affected 9.18.4.47","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Secure Firewall Adaptive Security Appliance (ASA) Software","version":"affected 9.18.4.50","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Secure Firewall Adaptive Security Appliance (ASA) Software","version":"affected 9.18.4.52","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Secure Firewall Adaptive Security Appliance (ASA) Software","version":"affected 9.18.4.53","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Secure Firewall Adaptive Security Appliance (ASA) Software","version":"affected 9.18.4.57","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Secure Firewall Adaptive Security Appliance (ASA) Software","version":"affected 9.18.4.66","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Secure Firewall Adaptive Security Appliance (ASA) Software","version":"affected 9.18.4.67","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Secure Firewall Adaptive Security Appliance (ASA) Software","version":"affected 9.18.4.68","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Secure Firewall Adaptive Security Appliance (ASA) Software","version":"affected 9.19.1","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Secure Firewall Adaptive Security Appliance (ASA) Software","version":"affected 9.19.1.5","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Secure Firewall Adaptive Security Appliance (ASA) Software","version":"affected 9.19.1.9","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Secure Firewall Adaptive Security Appliance (ASA) Software","version":"affected 9.19.1.12","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Secure Firewall Adaptive Security Appliance (ASA) Software","version":"affected 9.19.1.18","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Secure Firewall Adaptive Security Appliance (ASA) Software","version":"affected 9.19.1.22","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Secure Firewall Adaptive Security Appliance (ASA) Software","version":"affected 9.19.1.24","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Secure Firewall Adaptive Security Appliance (ASA) Software","version":"affected 9.19.1.27","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Secure Firewall Adaptive Security Appliance (ASA) Software","version":"affected 9.19.1.28","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Secure Firewall Adaptive Security Appliance (ASA) Software","version":"affected 9.19.1.31","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Secure Firewall Adaptive Security Appliance (ASA) Software","version":"affected 9.19.1.37","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Secure Firewall Adaptive Security Appliance (ASA) Software","version":"affected 9.19.1.38","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Secure Firewall Adaptive Security Appliance (ASA) Software","version":"affected 9.19.1.42","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Secure Firewall Adaptive Security Appliance (ASA) Software","version":"affected 9.20.1","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Secure Firewall Adaptive Security Appliance (ASA) Software","version":"affected 9.20.1.5","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Secure Firewall Adaptive Security Appliance (ASA) Software","version":"affected 9.20.2","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Secure Firewall Adaptive Security Appliance (ASA) Software","version":"affected 9.20.2.10","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Secure Firewall Adaptive Security Appliance (ASA) Software","version":"affected 9.20.2.21","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Secure Firewall Adaptive Security Appliance (ASA) Software","version":"affected 9.20.2.22","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Secure Firewall Adaptive Security Appliance (ASA) Software","version":"affected 9.20.3","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Secure Firewall Adaptive Security Appliance (ASA) Software","version":"affected 9.20.3.4","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Secure Firewall Adaptive Security Appliance (ASA) Software","version":"affected 9.20.3.7","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Secure Firewall Adaptive Security Appliance (ASA) Software","version":"affected 9.20.3.9","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Secure Firewall Adaptive Security Appliance (ASA) Software","version":"affected 9.20.3.10","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Secure Firewall Adaptive Security Appliance (ASA) Software","version":"affected 9.20.3.13","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Secure Firewall Adaptive Security Appliance (ASA) Software","version":"affected 9.20.3.16","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Secure Firewall Adaptive Security Appliance (ASA) Software","version":"affected 9.20.3.20","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Secure Firewall Adaptive Security Appliance (ASA) Software","version":"affected 9.20.4","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Secure Firewall Adaptive Security Appliance (ASA) Software","version":"affected 9.20.4.7","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Secure Firewall Adaptive Security Appliance (ASA) Software","version":"affected 9.22.1.1","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Secure Firewall Adaptive Security Appliance (ASA) Software","version":"affected 9.22.1.3","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Secure Firewall Adaptive Security Appliance (ASA) Software","version":"affected 9.22.1.2","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Secure Firewall Adaptive Security Appliance (ASA) Software","version":"affected 9.22.1.6","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Secure Firewall Adaptive Security Appliance (ASA) Software","version":"affected 9.22.2","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Secure Firewall Adaptive Security Appliance (ASA) Software","version":"affected 9.22.2.4","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Secure Firewall Adaptive Security Appliance (ASA) Software","version":"affected 9.22.2.9","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Secure Firewall Adaptive Security Appliance (ASA) Software","version":"affected 9.23.1","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Secure Firewall Adaptive Security Appliance (ASA) Software","version":"affected 9.23.1.3","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Secure Firewall Adaptive Security Appliance (ASA) Software","version":"affected 9.23.1.7","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Secure Firewall Adaptive Security Appliance (ASA) Software","version":"affected 9.23.1.13","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Secure Firewall Threat Defense (FTD) Software","version":"affected 7.2.0","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Secure Firewall Threat Defense (FTD) Software","version":"affected 7.2.0.1","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Secure Firewall Threat Defense (FTD) Software","version":"affected 7.2.1","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Secure Firewall Threat Defense (FTD) Software","version":"affected 7.2.2","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Secure Firewall Threat Defense (FTD) Software","version":"affected 7.2.3","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Secure Firewall Threat Defense (FTD) Software","version":"affected 7.2.4","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Secure Firewall Threat Defense (FTD) Software","version":"affected 7.2.4.1","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Secure Firewall Threat Defense (FTD) Software","version":"affected 7.2.5","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Secure Firewall Threat Defense (FTD) Software","version":"affected 7.2.5.1","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Secure Firewall Threat Defense (FTD) Software","version":"affected 7.2.6","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Secure Firewall Threat Defense (FTD) Software","version":"affected 7.2.7","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Secure Firewall Threat Defense (FTD) Software","version":"affected 7.2.5.2","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Secure Firewall Threat Defense (FTD) Software","version":"affected 7.2.8","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Secure Firewall Threat Defense (FTD) Software","version":"affected 7.2.8.1","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Secure Firewall Threat Defense (FTD) Software","version":"affected 7.2.9","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Secure Firewall Threat Defense (FTD) Software","version":"affected 7.2.10","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Secure Firewall Threat Defense (FTD) Software","version":"affected 7.2.10.2","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Secure Firewall Threat Defense (FTD) Software","version":"affected 7.3.0","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Secure Firewall Threat Defense (FTD) Software","version":"affected 7.3.1","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Secure Firewall Threat Defense (FTD) Software","version":"affected 7.3.1.1","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Secure Firewall Threat Defense (FTD) Software","version":"affected 7.3.1.2","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Secure Firewall Threat Defense (FTD) Software","version":"affected 7.4.0","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Secure Firewall Threat Defense (FTD) Software","version":"affected 7.4.1","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Secure Firewall Threat Defense (FTD) Software","version":"affected 7.4.1.1","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Secure Firewall Threat Defense (FTD) Software","version":"affected 7.4.2","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Secure Firewall Threat Defense (FTD) Software","version":"affected 7.4.2.1","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Secure Firewall Threat Defense (FTD) Software","version":"affected 7.4.2.2","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Secure Firewall Threat Defense (FTD) Software","version":"affected 7.4.2.3","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Secure Firewall Threat Defense (FTD) Software","version":"affected 7.4.2.4","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Secure Firewall Threat Defense (FTD) Software","version":"affected 7.6.0","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Secure Firewall Threat Defense (FTD) Software","version":"affected 7.6.1","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Secure Firewall Threat Defense (FTD) Software","version":"affected 7.6.2","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Secure Firewall Threat Defense (FTD) Software","version":"affected 7.6.2.1","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Secure Firewall Threat Defense (FTD) Software","version":"affected 7.7.0","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Secure Firewall Threat Defense (FTD) Software","version":"affected 7.7.10","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Secure Firewall Threat Defense (FTD) Software","version":"affected 7.7.10.1","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[{"source":"CNA","title":"","value":"The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.","time":"","lang":"en"}],"credits":[],"nvd_cpes":[{"cve_year":"2026","cve_id":"20014","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"cisco","cpe5":"adaptive_security_appliance_software","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"metrics":[{"other":{"content":{"id":"CVE-2026-20014","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","timestamp":"2026-03-04T21:38:31.628005Z","version":"2.0.3"},"type":"ssvc"}}],"providerMetadata":{"dateUpdated":"2026-03-04T21:38:38.947Z","orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP"},"title":"CISA ADP Vulnrichment"}],"cna":{"affected":[{"product":"Cisco Secure Firewall Adaptive Security Appliance (ASA) Software","vendor":"Cisco","versions":[{"status":"affected","version":"9.18.1"},{"status":"affected","version":"9.18.1.3"},{"status":"affected","version":"9.18.2"},{"status":"affected","version":"9.18.2.5"},{"status":"affected","version":"9.18.2.7"},{"status":"affected","version":"9.18.2.8"},{"status":"affected","version":"9.18.3"},{"status":"affected","version":"9.18.3.39"},{"status":"affected","version":"9.18.3.46"},{"status":"affected","version":"9.18.3.53"},{"status":"affected","version":"9.18.3.55"},{"status":"affected","version":"9.18.3.56"},{"status":"affected","version":"9.18.4"},{"status":"affected","version":"9.18.4.5"},{"status":"affected","version":"9.18.4.8"},{"status":"affected","version":"9.18.4.22"},{"status":"affected","version":"9.18.4.24"},{"status":"affected","version":"9.18.4.29"},{"status":"affected","version":"9.18.4.34"},{"status":"affected","version":"9.18.4.40"},{"status":"affected","version":"9.18.4.47"},{"status":"affected","version":"9.18.4.50"},{"status":"affected","version":"9.18.4.52"},{"status":"affected","version":"9.18.4.53"},{"status":"affected","version":"9.18.4.57"},{"status":"affected","version":"9.18.4.66"},{"status":"affected","version":"9.18.4.67"},{"status":"affected","version":"9.18.4.68"},{"status":"affected","version":"9.19.1"},{"status":"affected","version":"9.19.1.5"},{"status":"affected","version":"9.19.1.9"},{"status":"affected","version":"9.19.1.12"},{"status":"affected","version":"9.19.1.18"},{"status":"affected","version":"9.19.1.22"},{"status":"affected","version":"9.19.1.24"},{"status":"affected","version":"9.19.1.27"},{"status":"affected","version":"9.19.1.28"},{"status":"affected","version":"9.19.1.31"},{"status":"affected","version":"9.19.1.37"},{"status":"affected","version":"9.19.1.38"},{"status":"affected","version":"9.19.1.42"},{"status":"affected","version":"9.20.1"},{"status":"affected","version":"9.20.1.5"},{"status":"affected","version":"9.20.2"},{"status":"affected","version":"9.20.2.10"},{"status":"affected","version":"9.20.2.21"},{"status":"affected","version":"9.20.2.22"},{"status":"affected","version":"9.20.3"},{"status":"affected","version":"9.20.3.4"},{"status":"affected","version":"9.20.3.7"},{"status":"affected","version":"9.20.3.9"},{"status":"affected","version":"9.20.3.10"},{"status":"affected","version":"9.20.3.13"},{"status":"affected","version":"9.20.3.16"},{"status":"affected","version":"9.20.3.20"},{"status":"affected","version":"9.20.4"},{"status":"affected","version":"9.20.4.7"},{"status":"affected","version":"9.22.1.1"},{"status":"affected","version":"9.22.1.3"},{"status":"affected","version":"9.22.1.2"},{"status":"affected","version":"9.22.1.6"},{"status":"affected","version":"9.22.2"},{"status":"affected","version":"9.22.2.4"},{"status":"affected","version":"9.22.2.9"},{"status":"affected","version":"9.23.1"},{"status":"affected","version":"9.23.1.3"},{"status":"affected","version":"9.23.1.7"},{"status":"affected","version":"9.23.1.13"}]},{"product":"Cisco Secure Firewall Threat Defense (FTD) Software","vendor":"Cisco","versions":[{"status":"affected","version":"7.2.0"},{"status":"affected","version":"7.2.0.1"},{"status":"affected","version":"7.2.1"},{"status":"affected","version":"7.2.2"},{"status":"affected","version":"7.2.3"},{"status":"affected","version":"7.2.4"},{"status":"affected","version":"7.2.4.1"},{"status":"affected","version":"7.2.5"},{"status":"affected","version":"7.2.5.1"},{"status":"affected","version":"7.2.6"},{"status":"affected","version":"7.2.7"},{"status":"affected","version":"7.2.5.2"},{"status":"affected","version":"7.2.8"},{"status":"affected","version":"7.2.8.1"},{"status":"affected","version":"7.2.9"},{"status":"affected","version":"7.2.10"},{"status":"affected","version":"7.2.10.2"},{"status":"affected","version":"7.3.0"},{"status":"affected","version":"7.3.1"},{"status":"affected","version":"7.3.1.1"},{"status":"affected","version":"7.3.1.2"},{"status":"affected","version":"7.4.0"},{"status":"affected","version":"7.4.1"},{"status":"affected","version":"7.4.1.1"},{"status":"affected","version":"7.4.2"},{"status":"affected","version":"7.4.2.1"},{"status":"affected","version":"7.4.2.2"},{"status":"affected","version":"7.4.2.3"},{"status":"affected","version":"7.4.2.4"},{"status":"affected","version":"7.6.0"},{"status":"affected","version":"7.6.1"},{"status":"affected","version":"7.6.2"},{"status":"affected","version":"7.6.2.1"},{"status":"affected","version":"7.7.0"},{"status":"affected","version":"7.7.10"},{"status":"affected","version":"7.7.10.1"}]}],"descriptions":[{"lang":"en","value":"A vulnerability in the IKEv2 feature of Cisco Secure Firewall ASA Software and Cisco Secure FTD Software could allow an authenticated, remote attacker with valid VPN user credentials to cause a DoS condition on an affected device that may also impact the availability of services to devices elsewhere in the network.\r\n\r This vulnerability is due to the improper processing of IKEv2 packets. An attacker could exploit this vulnerability by sending crafted, authenticated IKEv2 packets to an affected device. A successful exploit could allow the attacker to exhaust memory, causing the device to reload."}],"exploits":[{"lang":"en","value":"The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":7.7,"baseSeverity":"HIGH","confidentialityImpact":"NONE","integrityImpact":"NONE","privilegesRequired":"LOW","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H","version":"3.1"},"format":"cvssV3_1"}],"problemTypes":[{"descriptions":[{"cweId":"CWE-401","description":"Missing Release of Memory after Effective Lifetime","lang":"en","type":"cwe"}]}],"providerMetadata":{"dateUpdated":"2026-03-04T17:21:26.098Z","orgId":"d1c1063e-7a18-46af-9102-31f8928bc633","shortName":"cisco"},"references":[{"name":"cisco-sa-asaftd-ikev2-dos-eBueGdEG","url":"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-ikev2-dos-eBueGdEG"}],"source":{"advisory":"cisco-sa-asaftd-ikev2-dos-eBueGdEG","defects":["CSCwq01516","CSCwq50506"],"discovery":"INTERNAL"}}},"cveMetadata":{"assignerOrgId":"d1c1063e-7a18-46af-9102-31f8928bc633","assignerShortName":"cisco","cveId":"CVE-2026-20014","datePublished":"2026-03-04T17:21:26.098Z","dateReserved":"2025-10-08T11:59:15.351Z","dateUpdated":"2026-03-04T21:38:38.947Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-03-04 18:16:15","lastModifiedDate":"2026-04-16 20:11:34","problem_types":["CWE-401","CWE-401 Missing Release of Memory after Effective Lifetime"],"metrics":{"cvssMetricV31":[{"source":"psirt@cisco.com","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H","baseScore":7.7,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.1,"impactScore":4}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*","versionStartIncluding":"9.12.1","versionEndExcluding":"9.16.4.85","matchCriteriaId":"74292810-417D-42CC-9123-55166145E91D"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*","versionStartIncluding":"9.17.1","versionEndExcluding":"9.18.4.66","matchCriteriaId":"7EFC1809-7619-43ED-80FD-0FC28C876879"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*","versionStartIncluding":"9.19.1","versionEndExcluding":"9.20.4","matchCriteriaId":"4988A136-196A-448B-A416-992803647AB2"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*","versionStartIncluding":"9.22.1.1","versionEndExcluding":"9.22.2.9","matchCriteriaId":"FED09C17-AE2F-41DB-AB9F-537E7D22CC22"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*","versionStartIncluding":"9.23.1","versionEndExcluding":"9.23.1.13","matchCriteriaId":"852A0BF4-FF9A-47EE-8E3A-E31C545783F6"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:firepower_threat_defense_software:*:*:*:*:*:*:*:*","versionStartIncluding":"6.4.0","versionEndExcluding":"7.0.9","matchCriteriaId":"A02019B1-284B-4118-A544-9AA56216E741"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:firepower_threat_defense_software:*:*:*:*:*:*:*:*","versionStartIncluding":"7.1.0","versionEndExcluding":"7.2.11","matchCriteriaId":"3DA98A98-A084-4DB0-B08F-33EB6C8607C0"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:firepower_threat_defense_software:*:*:*:*:*:*:*:*","versionStartIncluding":"7.3.0","versionEndExcluding":"7.4.3","matchCriteriaId":"737DB8CE-EC0B-4221-A8BF-3E64702DE092"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:firepower_threat_defense_software:*:*:*:*:*:*:*:*","versionStartIncluding":"7.6.0","versionEndExcluding":"7.6.4","matchCriteriaId":"26A29A1A-8013-4CE1-8DE5-4C82778A1D96"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:firepower_threat_defense_software:*:*:*:*:*:*:*:*","versionStartIncluding":"7.7.0","versionEndExcluding":"7.7.11","matchCriteriaId":"A267F3D1-7449-4622-91AB-F9CA2DDDB61E"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"20014","Ordinal":"1","Title":"CVE-2026-20014","CVE":"CVE-2026-20014","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"20014","Ordinal":"1","NoteData":"A vulnerability in the IKEv2 feature of Cisco Secure Firewall ASA Software and Cisco Secure FTD Software could allow an authenticated, remote attacker with valid VPN user credentials to cause a DoS condition on an affected device that may also impact the availability of services to devices elsewhere in the network.\r\n\r This vulnerability is due to the improper processing of IKEv2 packets. An attacker could exploit this vulnerability by sending crafted, authenticated IKEv2 packets to an affected device. A successful exploit could allow the attacker to exhaust memory, causing the device to reload.","Type":"Description","Title":"CVE-2026-20014"}]}}}