Description

A vulnerability in the handling of the embryonic connection limits in Cisco Secure Firewall Adaptive Security Appliance (ASA) Software could allow an unauthenticated, remote attacker to cause incoming TCP SYN packets to be dropped incorrectly. This vulnerability is due to improper handling of new, incoming TCP connections that are destined to management or data interfaces when the device is under a TCP SYN flood attack. An attacker could exploit this vulnerability by sending a crafted stream of traffic to an affected device. A successful exploit could allow the attacker to prevent all incoming TCP connections to the device from being established, including remote management access, Remote Access VPN (RAVPN) connections, and all network protocols that are TCP-based. This results in a denial of service (DoS) condition for affected features.

INFO

Published Date :

2026-03-04T17:22:34.106Z

Last Modified :

2026-03-04T20:52:52.679Z

Source :

cisco
AFFECTED PRODUCTS

The following products are affected by CVE-2026-20082 vulnerability.

Vendors Products
Cisco
  • Adaptive Security Appliance Software
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2026-20082.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact