CVE-2026-20013

5.8 MEDIUM

📋 TL;DR

A memory exhaustion vulnerability in Cisco ASA and FTD software's IKEv2 implementation allows unauthenticated remote attackers to cause denial of service by sending crafted IKEv2 packets. This affects organizations using Cisco Secure Firewall ASA Software or Cisco Secure FTD Software with IKEv2 enabled.

💻 Affected Systems

Products:
  • Cisco Secure Firewall ASA Software
  • Cisco Secure FTD Software
Versions: Multiple versions - check Cisco advisory for specific affected versions
Operating Systems: Cisco ASA OS, Cisco FTD OS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects devices with IKEv2 feature enabled. Devices using only IKEv1 are not vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device crash requiring manual reload, disrupting all network traffic through the firewall and potentially causing cascading network outages.

🟠

Likely Case

Degraded firewall performance leading to packet loss, increased latency, and potential service disruption for internal systems.

🟢

If Mitigated

Minimal impact if IKEv2 is disabled or devices are not internet-facing with proper network segmentation.

🌐 Internet-Facing: HIGH - Unauthenticated remote exploitation makes internet-facing devices prime targets for DoS attacks.
🏢 Internal Only: MEDIUM - Internal attackers could still exploit, but requires network access and IKEv2 connectivity.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Crafting IKEv2 packets to trigger memory exhaustion is relatively straightforward for attackers with network access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to Cisco advisory for specific fixed versions

Vendor Advisory: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-ikev2-dos-eBueGdEG

Restart Required: Yes

Instructions:

1. Check current version with 'show version'. 2. Download appropriate fixed version from Cisco. 3. Follow Cisco upgrade procedures for ASA/FTD. 4. Reload device after upgrade.

🔧 Temporary Workarounds

Disable IKEv2

all

Disable IKEv2 feature if not required, use IKEv1 instead

crypto ikev2 disable outside

Restrict IKEv2 Access

all

Limit IKEv2 connections to trusted IPs using ACLs

access-list IKEV2-ACL permit ip host <trusted_ip> any
crypto map MYMAP 10 match address IKEV2-ACL

🧯 If You Can't Patch

  • Implement strict network ACLs to limit IKEv2 traffic to trusted sources only
  • Monitor device memory usage and implement alerting for abnormal IKEv2 traffic patterns

🔍 How to Verify

Check if Vulnerable:

Check if IKEv2 is enabled: 'show running-config | include ikev2' and verify version against Cisco advisory

Check Version:

show version

Verify Fix Applied:

Verify upgraded to fixed version: 'show version' and confirm IKEv2 functionality after patch

📡 Detection & Monitoring

Log Indicators:

  • High memory usage alerts
  • IKEv2 session failures
  • Device reload events
  • ASA/FTD crash logs

Network Indicators:

  • Unusual IKEv2 packet spikes from single sources
  • IKEv2 traffic to non-VPN endpoints

SIEM Query:

source="asa_ftd_logs" AND ("IKEv2" OR "memory" OR "reload") AND severity>=4

🔗 References

📤 Share & Export