Cisco ASA/FTD: Cluster Replication RMEM Bypass (CVE-2026-20073)
CVE-2026-20073 Published on March 4, 2026

Cisco Secure Firewall Adaptive Security Appliance Software and Cisco Secure Firewall Threat Defense Software Access Control List Bypass Vulnerability
A vulnerability in Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to send traffic that should be denied through an affected device. This vulnerability is due to improper error handling when an affected device that is joining a cluster runs out of memory while replicating access control rules. An attacker could exploit this vulnerability by sending traffic that should be blocked through the device. A successful exploit could allow the attacker to bypass access controls and reach devices in protected networks.

NVD

Vulnerability Analysis

CVE-2026-20073 can be exploited with network access, and does not require authorization privileges or user interaction. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have no impact on confidentiality, with no impact on integrity, and no impact on availability.

Attack Vector:
NETWORK
Attack Complexity:
LOW
Privileges Required:
NONE
User Interaction:
NONE
Scope:
CHANGED
Confidentiality Impact:
NONE
Integrity Impact:
LOW
Availability Impact:
NONE

Weakness Type

What is an Authorization Vulnerability?

The software does not restrict or incorrectly restricts access to a resource from an unauthorized actor.

CVE-2026-20073 has been classified to as an Authorization vulnerability or weakness.


Products Associated with CVE-2026-20073

Want to know whenever a new CVE is published for Cisco Adaptive Security Appliance? stack.watch will email you.

 

Affected Versions

Cisco Secure Firewall Adaptive Security Appliance (ASA) Software: Cisco Secure Firewall Threat Defense (FTD) Software:

Exploit Probability

EPSS
0.05%
Percentile
16.80%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.