{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-23T11:47:21.020","vulnerabilities":[{"cve":{"id":"CVE-2026-20082","sourceIdentifier":"psirt@cisco.com","published":"2026-03-04T18:16:24.483","lastModified":"2026-03-05T19:39:11.967","vulnStatus":"Undergoing Analysis","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability in the handling of the embryonic connection limits in Cisco Secure Firewall Adaptive Security Appliance (ASA) Software could allow an unauthenticated, remote attacker to cause incoming TCP SYN packets to be dropped incorrectly.\r\n\r This vulnerability is due to improper handling of new, incoming TCP connections that are destined to management or data interfaces when the device is under a TCP SYN flood attack. An attacker could exploit this vulnerability by sending a crafted stream of traffic to an affected device. A successful exploit could allow the attacker to prevent all incoming TCP connections to the device from being established, including remote management access, Remote Access VPN (RAVPN) connections, and all network protocols that are TCP-based. This results in a denial of service (DoS) condition for affected features."},{"lang":"es","value":"Una vulnerabilidad en el manejo de los límites de conexión embrionaria en el software Cisco Secure Firewall Adaptive Security Appliance (ASA) podría permitir a un atacante remoto no autenticado causar que los paquetes TCP SYN entrantes sean descartados incorrectamente. Esta vulnerabilidad se debe a un manejo inadecuado de las nuevas conexiones TCP entrantes que están destinadas a interfaces de gestión o de datos cuando el dispositivo está bajo un ataque de inundación TCP SYN. Un atacante podría explotar esta vulnerabilidad enviando un flujo de tráfico manipulado a un dispositivo afectado. Un exploit exitoso podría permitir al atacante evitar que se establezcan todas las conexiones TCP entrantes al dispositivo, incluyendo el acceso de gestión remota, las conexiones de VPN de Acceso Remoto (RAVPN) y todos los protocolos de red basados en TCP. Esto resulta en una condición de denegación de servicio (DoS) para las características afectadas."}],"metrics":{"cvssMetricV31":[{"source":"psirt@cisco.com","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H","baseScore":8.6,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":4.0}]},"weaknesses":[{"source":"psirt@cisco.com","type":"Primary","description":[{"lang":"en","value":"CWE-772"}]}],"references":[{"url":"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-dos-FCvLD6vR","source":"psirt@cisco.com"}]}}]}