{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T08:54:22.749","vulnerabilities":[{"cve":{"id":"CVE-2026-20023","sourceIdentifier":"psirt@cisco.com","published":"2026-03-04T19:16:14.627","lastModified":"2026-03-05T19:39:11.967","vulnStatus":"Undergoing Analysis","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability in the OSPF protocol of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, adjacent attacker to corrupt memory on an affected device, resulting in a denial of service (DoS) condition.\r\n\r This vulnerability is due to memory corruption when parsing OSPF protocol packets. An attacker could exploit this vulnerability by sending crafted OSPF packets to an affected device. A successful exploit could allow the attacker to cause memory corruption causing the affected device to reboot, resulting in a DoS condition."},{"lang":"es","value":"Una vulnerabilidad en el protocolo OSPF del software Cisco Secure Firewall Adaptive Security Appliance (ASA) y del software Cisco Secure Firewall Threat Defense (FTD) podría permitir a un atacante adyacente no autenticado corromper la memoria en un dispositivo afectado, lo que resultaría en una condición de denegación de servicio (DoS). Esta vulnerabilidad se debe a la corrupción de memoria al analizar paquetes del protocolo OSPF. Un atacante podría explotar esta vulnerabilidad enviando paquetes OSPF manipulados a un dispositivo afectado. Un exploit exitoso podría permitir al atacante causar corrupción de memoria provocando que el dispositivo afectado se reinicie, lo que resultaría en una condición de DoS."}],"metrics":{"cvssMetricV31":[{"source":"psirt@cisco.com","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H","baseScore":6.1,"baseSeverity":"MEDIUM","attackVector":"ADJACENT_NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":1.6,"impactScore":4.0}]},"weaknesses":[{"source":"psirt@cisco.com","type":"Primary","description":[{"lang":"en","value":"CWE-787"}]}],"references":[{"url":"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-ospf-ZH8PhbSW","source":"psirt@cisco.com"}]}}]}