7.7
CVE-2026-20100
- EPSS 0.19%
- Veröffentlicht 04.03.2026 17:19:07
- Zuletzt bearbeitet 05.03.2026 19:39:11
- Quelle psirt@cisco.com
- CVE-Watchlists
- Unerledigt
A vulnerability in the LUA interperter of the Remote Access SSL VPN feature of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Secure Firewall Threat Defense (FTD) Software could allow an authenticated, remote attacker with a valid VPN connection to cause the device to reload unexpectedly, resulting in a denial of service (DoS) condition. This does not affect the management or MUS interfaces. This vulnerability is due to trusting user input without validation in the LUA interprerter. An attacker could exploit this vulnerability by sending crafted HTTP packets to the Remote Access SSL VPN server. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerCisco
≫
Produkt
Cisco Secure Firewall Adaptive Security Appliance (ASA) Software
Version
9.12.1
Status
affected
Version
9.12.1.2
Status
affected
Version
9.12.1.3
Status
affected
Version
9.12.2
Status
affected
Version
9.12.2.4
Status
affected
Version
9.12.2.5
Status
affected
Version
9.12.2.9
Status
affected
Version
9.12.3
Status
affected
Version
9.12.3.2
Status
affected
Version
9.12.3.7
Status
affected
Version
9.12.4
Status
affected
Version
9.12.3.12
Status
affected
Version
9.12.3.9
Status
affected
Version
9.12.2.1
Status
affected
Version
9.12.4.2
Status
affected
Version
9.12.4.4
Status
affected
Version
9.12.4.7
Status
affected
Version
9.12.4.10
Status
affected
Version
9.12.4.13
Status
affected
Version
9.12.4.8
Status
affected
Version
9.12.4.18
Status
affected
Version
9.12.4.24
Status
affected
Version
9.12.4.26
Status
affected
Version
9.12.4.29
Status
affected
Version
9.12.4.30
Status
affected
Version
9.12.4.35
Status
affected
Version
9.12.4.37
Status
affected
Version
9.12.4.38
Status
affected
Version
9.12.4.39
Status
affected
Version
9.12.4.40
Status
affected
Version
9.12.4.41
Status
affected
Version
9.12.4.47
Status
affected
Version
9.12.4.48
Status
affected
Version
9.12.4.50
Status
affected
Version
9.12.4.52
Status
affected
Version
9.12.4.54
Status
affected
Version
9.12.4.55
Status
affected
Version
9.12.4.56
Status
affected
Version
9.12.4.58
Status
affected
Version
9.12.4.62
Status
affected
Version
9.12.4.65
Status
affected
Version
9.12.4.67
Status
affected
Version
9.16.1
Status
affected
Version
9.16.1.28
Status
affected
Version
9.16.2
Status
affected
Version
9.16.2.3
Status
affected
Version
9.16.2.7
Status
affected
Version
9.16.2.11
Status
affected
Version
9.16.2.13
Status
affected
Version
9.16.2.14
Status
affected
Version
9.16.3
Status
affected
Version
9.16.3.3
Status
affected
Version
9.16.3.14
Status
affected
Version
9.16.3.15
Status
affected
Version
9.16.3.19
Status
affected
Version
9.16.3.23
Status
affected
Version
9.16.4
Status
affected
Version
9.16.4.9
Status
affected
Version
9.16.4.14
Status
affected
Version
9.16.4.19
Status
affected
Version
9.16.4.27
Status
affected
Version
9.16.4.38
Status
affected
Version
9.16.4.39
Status
affected
Version
9.16.4.42
Status
affected
Version
9.16.4.48
Status
affected
Version
9.16.4.55
Status
affected
Version
9.16.4.57
Status
affected
Version
9.16.4.61
Status
affected
Version
9.16.4.62
Status
affected
Version
9.16.4.67
Status
affected
Version
9.16.4.70
Status
affected
Version
9.16.4.71
Status
affected
Version
9.16.4.76
Status
affected
Version
9.16.4.82
Status
affected
Version
9.16.4.84
Status
affected
Version
9.17.1
Status
affected
Version
9.17.1.7
Status
affected
Version
9.17.1.9
Status
affected
Version
9.17.1.10
Status
affected
Version
9.17.1.11
Status
affected
Version
9.17.1.13
Status
affected
Version
9.17.1.15
Status
affected
Version
9.17.1.20
Status
affected
Version
9.17.1.30
Status
affected
Version
9.17.1.33
Status
affected
Version
9.17.1.39
Status
affected
Version
9.17.1.45
Status
affected
Version
9.17.1.46
Status
affected
Version
9.18.1
Status
affected
Version
9.18.1.3
Status
affected
Version
9.18.2
Status
affected
Version
9.18.2.5
Status
affected
Version
9.18.2.7
Status
affected
Version
9.18.2.8
Status
affected
Version
9.18.3
Status
affected
Version
9.18.3.39
Status
affected
Version
9.18.3.46
Status
affected
Version
9.18.3.53
Status
affected
Version
9.18.3.55
Status
affected
Version
9.18.3.56
Status
affected
Version
9.18.4
Status
affected
Version
9.18.4.5
Status
affected
Version
9.18.4.8
Status
affected
Version
9.18.4.22
Status
affected
Version
9.18.4.24
Status
affected
Version
9.18.4.29
Status
affected
Version
9.18.4.34
Status
affected
Version
9.18.4.40
Status
affected
Version
9.18.4.47
Status
affected
Version
9.18.4.50
Status
affected
Version
9.18.4.52
Status
affected
Version
9.18.4.53
Status
affected
Version
9.18.4.57
Status
affected
Version
9.19.1
Status
affected
Version
9.19.1.5
Status
affected
Version
9.19.1.9
Status
affected
Version
9.19.1.12
Status
affected
Version
9.19.1.18
Status
affected
Version
9.19.1.22
Status
affected
Version
9.19.1.24
Status
affected
Version
9.19.1.27
Status
affected
Version
9.19.1.28
Status
affected
Version
9.19.1.31
Status
affected
Version
9.19.1.37
Status
affected
Version
9.19.1.38
Status
affected
Version
9.19.1.42
Status
affected
Version
9.20.1
Status
affected
Version
9.20.1.5
Status
affected
Version
9.20.2
Status
affected
Version
9.20.2.10
Status
affected
Version
9.20.2.21
Status
affected
Version
9.20.2.22
Status
affected
Version
9.20.3
Status
affected
Version
9.20.3.4
Status
affected
Version
9.20.3.7
Status
affected
Version
9.20.3.9
Status
affected
Version
9.20.3.10
Status
affected
Version
9.20.3.13
Status
affected
Version
9.20.3.16
Status
affected
Version
9.20.3.20
Status
affected
Version
9.22.1.1
Status
affected
Version
9.22.1.3
Status
affected
Version
9.22.1.2
Status
affected
Version
9.22.1.6
Status
affected
Version
9.22.2
Status
affected
Version
9.23.1
Status
affected
Version
9.23.1.3
Status
affected
HerstellerCisco
≫
Produkt
Cisco Secure Firewall Threat Defense (FTD) Software
Version
6.4.0
Status
affected
Version
6.4.0.1
Status
affected
Version
6.4.0.3
Status
affected
Version
6.4.0.2
Status
affected
Version
6.4.0.4
Status
affected
Version
6.4.0.5
Status
affected
Version
6.4.0.6
Status
affected
Version
6.4.0.7
Status
affected
Version
6.4.0.8
Status
affected
Version
6.4.0.9
Status
affected
Version
6.4.0.10
Status
affected
Version
6.4.0.11
Status
affected
Version
6.4.0.12
Status
affected
Version
6.4.0.13
Status
affected
Version
6.4.0.14
Status
affected
Version
6.4.0.15
Status
affected
Version
6.4.0.16
Status
affected
Version
6.4.0.17
Status
affected
Version
6.4.0.18
Status
affected
Version
7.0.0
Status
affected
Version
7.0.0.1
Status
affected
Version
7.0.1
Status
affected
Version
7.0.1.1
Status
affected
Version
7.0.2
Status
affected
Version
7.0.2.1
Status
affected
Version
7.0.3
Status
affected
Version
7.0.4
Status
affected
Version
7.0.5
Status
affected
Version
7.0.6
Status
affected
Version
7.0.6.1
Status
affected
Version
7.0.6.2
Status
affected
Version
7.0.6.3
Status
affected
Version
7.0.7
Status
affected
Version
7.0.8
Status
affected
Version
7.0.8.1
Status
affected
Version
7.1.0
Status
affected
Version
7.1.0.1
Status
affected
Version
7.1.0.2
Status
affected
Version
7.1.0.3
Status
affected
Version
7.2.0
Status
affected
Version
7.2.0.1
Status
affected
Version
7.2.1
Status
affected
Version
7.2.2
Status
affected
Version
7.2.3
Status
affected
Version
7.2.4
Status
affected
Version
7.2.4.1
Status
affected
Version
7.2.5
Status
affected
Version
7.2.5.1
Status
affected
Version
7.2.6
Status
affected
Version
7.2.7
Status
affected
Version
7.2.5.2
Status
affected
Version
7.2.8
Status
affected
Version
7.2.8.1
Status
affected
Version
7.2.9
Status
affected
Version
7.2.10
Status
affected
Version
7.2.10.2
Status
affected
Version
7.3.0
Status
affected
Version
7.3.1
Status
affected
Version
7.3.1.1
Status
affected
Version
7.3.1.2
Status
affected
Version
7.4.0
Status
affected
Version
7.4.1
Status
affected
Version
7.4.1.1
Status
affected
Version
7.4.2
Status
affected
Version
7.4.2.1
Status
affected
Version
7.4.2.2
Status
affected
Version
7.4.2.3
Status
affected
Version
7.4.2.4
Status
affected
Version
7.6.0
Status
affected
Version
7.6.1
Status
affected
Version
7.6.2
Status
affected
Version
7.6.2.1
Status
affected
Version
7.7.0
Status
affected
Version
7.7.10
Status
affected
Version
7.7.10.1
Status
affected
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.19% | 0.407 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| psirt@cisco.com | 7.7 | 3.1 | 4 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
|
CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.