{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T13:18:31.536","vulnerabilities":[{"cve":{"id":"CVE-2026-20006","sourceIdentifier":"psirt@cisco.com","published":"2026-03-04T18:16:13.803","lastModified":"2026-03-05T19:39:11.967","vulnStatus":"Awaiting Analysis","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability in the TLS cryptography functionality of the Snort 3 Detection Engine of Cisco Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause the Snort 3 Detection Engine to unexpectedly restart, resulting in a denial of service (DoS) condition.\r\n\r\nThis vulnerability is due to improper implementation of the TLS protocol. An attacker could exploit this vulnerability by sending a crafted TLS packet to an affected system. A successful exploit could allow the attacker to cause a device that is running Cisco Secure FTD Software to drop network traffic, resulting in a DoS condition.&nbsp;\r\nNote: TLS 1.3 is not affected by this vulnerability."},{"lang":"es","value":"Una vulnerabilidad en la funcionalidad de criptografía TLS del motor de detección Snort 3 del software Cisco Secure Firewall Threat Defense (FTD) podría permitir a un atacante remoto no autenticado provocar que el motor de detección Snort 3 se reinicie inesperadamente, lo que resultaría en una condición de denegación de servicio (DoS).\n\nEsta vulnerabilidad se debe a una implementación incorrecta del protocolo TLS. Un atacante podría explotar esta vulnerabilidad enviando un paquete TLS manipulado a un sistema afectado. Un exploit exitoso podría permitir al atacante provocar que un dispositivo que ejecuta el software Cisco Secure FTD descarte el tráfico de red, lo que resultaría en una condición de DoS.\nNota: TLS 1.3 no se ve afectado por esta vulnerabilidad."}],"metrics":{"cvssMetricV31":[{"source":"psirt@cisco.com","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L","baseScore":5.8,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"LOW"},"exploitabilityScore":3.9,"impactScore":1.4}]},"weaknesses":[{"source":"psirt@cisco.com","type":"Primary","description":[{"lang":"en","value":"CWE-388"}]}],"references":[{"url":"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-tcp-dos-rHfqnwRg","source":"psirt@cisco.com"}]}}]}