8.6

CVE-2026-20101

Warnung
A vulnerability in the SAML 2.0 single sign-on (SSO) feature of Cisco Secure Firewall ASA Software and Secure FTD Software could allow an unauthenticated, remote attacker to cause the device to reload unexpectedly, resulting in a DoS condition.

 This vulnerability is due to insufficient error checking when processing SAML messages. An attacker could exploit this vulnerability by sending crafted SAML messages to the SAML service. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
CiscoAdaptive Security Appliance Software Version >= 9.12.1 < 9.16.4.85
CiscoAdaptive Security Appliance Software Version >= 9.17.1 < 9.18.4.66
CiscoAdaptive Security Appliance Software Version >= 9.19.1 < 9.20.4
CiscoAdaptive Security Appliance Software Version >= 9.22.1.1 < 9.22.2.4
CiscoAdaptive Security Appliance Software Version >= 9.23.1 < 9.23.1.7
CiscoFirepower Threat Defense Software Version >= 6.4.0 < 7.0.9
CiscoFirepower Threat Defense Software Version >= 7.1.0 < 7.2.11
CiscoFirepower Threat Defense Software Version >= 7.3.0 < 7.4.3
CiscoFirepower Threat Defense Software Version >= 7.6.0 < 7.6.4
CiscoFirepower Threat Defense Software Version >= 7.7.0 < 7.7.11
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.16% 0.36
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
psirt@cisco.com 8.6 3.9 4
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
CWE-330 Use of Insufficiently Random Values

The product uses insufficiently random numbers or values in a security context that depends on unpredictable numbers.