{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-13T16:11:38.073","vulnerabilities":[{"cve":{"id":"CVE-2026-20014","sourceIdentifier":"psirt@cisco.com","published":"2026-03-04T18:16:15.557","lastModified":"2026-04-16T20:11:34.827","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability in the IKEv2 feature of Cisco Secure Firewall ASA Software and Cisco Secure FTD Software could allow an authenticated, remote attacker with valid VPN user credentials to cause a DoS condition on an affected device that may also impact the availability of services to devices elsewhere in the network.\r\n\r This vulnerability is due to the improper processing of IKEv2 packets. An attacker could exploit this vulnerability by sending crafted, authenticated IKEv2 packets to an affected device. A successful exploit could allow the attacker to exhaust memory, causing the device to reload."},{"lang":"es","value":"Una vulnerabilidad en la característica IKEv2 de Cisco Secure Firewall ASA Software y Cisco Secure FTD Software podría permitir a un atacante remoto autenticado con credenciales de usuario VPN válidas causar una condición de DoS en un dispositivo afectado que también podría impactar la disponibilidad de los servicios a dispositivos en otras partes de la red. Esta vulnerabilidad se debe al procesamiento incorrecto de paquetes IKEv2. Un atacante podría explotar esta vulnerabilidad enviando paquetes IKEv2 manipulados y autenticados a un dispositivo afectado. Un exploit exitoso podría permitir al atacante agotar la memoria, provocando que el dispositivo se recargue."}],"metrics":{"cvssMetricV31":[{"source":"psirt@cisco.com","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H","baseScore":7.7,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.1,"impactScore":4.0}]},"weaknesses":[{"source":"psirt@cisco.com","type":"Primary","description":[{"lang":"en","value":"CWE-401"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*","versionStartIncluding":"9.12.1","versionEndExcluding":"9.16.4.85","matchCriteriaId":"74292810-417D-42CC-9123-55166145E91D"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*","versionStartIncluding":"9.17.1","versionEndExcluding":"9.18.4.66","matchCriteriaId":"7EFC1809-7619-43ED-80FD-0FC28C876879"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*","versionStartIncluding":"9.19.1","versionEndExcluding":"9.20.4","matchCriteriaId":"4988A136-196A-448B-A416-992803647AB2"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*","versionStartIncluding":"9.22.1.1","versionEndExcluding":"9.22.2.9","matchCriteriaId":"FED09C17-AE2F-41DB-AB9F-537E7D22CC22"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*","versionStartIncluding":"9.23.1","versionEndExcluding":"9.23.1.13","matchCriteriaId":"852A0BF4-FF9A-47EE-8E3A-E31C545783F6"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:firepower_threat_defense_software:*:*:*:*:*:*:*:*","versionStartIncluding":"6.4.0","versionEndExcluding":"7.0.9","matchCriteriaId":"A02019B1-284B-4118-A544-9AA56216E741"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:firepower_threat_defense_software:*:*:*:*:*:*:*:*","versionStartIncluding":"7.1.0","versionEndExcluding":"7.2.11","matchCriteriaId":"3DA98A98-A084-4DB0-B08F-33EB6C8607C0"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:firepower_threat_defense_software:*:*:*:*:*:*:*:*","versionStartIncluding":"7.3.0","versionEndExcluding":"7.4.3","matchCriteriaId":"737DB8CE-EC0B-4221-A8BF-3E64702DE092"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:firepower_threat_defense_software:*:*:*:*:*:*:*:*","versionStartIncluding":"7.6.0","versionEndExcluding":"7.6.4","matchCriteriaId":"26A29A1A-8013-4CE1-8DE5-4C82778A1D96"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:firepower_threat_defense_software:*:*:*:*:*:*:*:*","versionStartIncluding":"7.7.0","versionEndExcluding":"7.7.11","matchCriteriaId":"A267F3D1-7449-4622-91AB-F9CA2DDDB61E"}]}]}],"references":[{"url":"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-ikev2-dos-eBueGdEG","source":"psirt@cisco.com","tags":["Vendor Advisory"]}]}}]}