{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-23T23:53:08.999","vulnerabilities":[{"cve":{"id":"CVE-2026-20052","sourceIdentifier":"psirt@cisco.com","published":"2026-03-04T18:16:19.420","lastModified":"2026-03-05T19:39:11.967","vulnStatus":"Awaiting Analysis","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability in the memory management handling for the Snort 3 Detection Engine of Cisco Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause the Snort 3 Detection Engine to restart.\r\n\r\nThis vulnerability is due to a logic error in memory management when a device is performing Snort 3 SSL packet inspection. An attacker could exploit this vulnerability by sending crafted SSL packets&nbsp;through an established connection to be parsed by the Snort 3 Detection Engine. A successful exploit could allow the attacker to cause a denial of service (DoS) condition when the Snort 3 Detection Engine unexpectedly restarts."},{"lang":"es","value":"Una vulnerabilidad en el manejo de la gestión de memoria para el Motor de Detección Snort 3 del software Cisco Secure Cortafuegos Defensa contra Amenazas (FTD) podría permitir a un atacante remoto no autenticado causar que el Motor de Detección Snort 3 se reinicie.\n\nEsta vulnerabilidad se debe a un error de lógica en la gestión de memoria cuando un dispositivo está realizando inspección de paquetes SSL de Snort 3. Un atacante podría explotar esta vulnerabilidad enviando paquetes SSL manipulados a través de una conexión establecida para ser analizados por el Motor de Detección Snort 3. Un exploit exitoso podría permitir al atacante causar una condición de denegación de servicio (DoS) cuando el Motor de Detección Snort 3 se reinicia inesperadamente."}],"metrics":{"cvssMetricV31":[{"source":"psirt@cisco.com","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L","baseScore":5.8,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"LOW"},"exploitabilityScore":3.9,"impactScore":1.4}]},"weaknesses":[{"source":"psirt@cisco.com","type":"Primary","description":[{"lang":"en","value":"CWE-788"}]}],"references":[{"url":"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-snort3ssl-FBEKYXpH","source":"psirt@cisco.com"}]}}]}