CVE-2026-20073 Overview
A vulnerability in Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass access controls and send traffic that should be denied through an affected device. This authorization bypass vulnerability arises from improper error handling when an affected device joining a cluster runs out of memory while replicating access control rules.
Critical Impact
Attackers can bypass firewall access controls to reach devices in protected networks, potentially exposing internal systems to unauthorized access.
Affected Products
- Cisco Secure Firewall Adaptive Security Appliance (ASA) Software
- Cisco Secure Firewall Threat Defense (FTD) Software
- Cisco Secure Firewall devices configured in cluster mode
Discovery Timeline
- 2026-03-04 - CVE-2026-20073 published to NVD
- 2026-03-05 - Last updated in NVD database
Technical Details for CVE-2026-20073
Vulnerability Analysis
This vulnerability (CWE-284: Improper Access Control) occurs during the cluster join process when a Cisco ASA or FTD device experiences memory exhaustion while replicating access control rules from other cluster members. Under normal operations, access control lists (ACLs) are synchronized across all devices in a firewall cluster to ensure consistent policy enforcement. However, when a joining device runs out of memory during this replication process, the error is not properly handled, resulting in incomplete or missing access control rules.
The consequence is that traffic which should be blocked by the firewall's access control policies may instead be permitted through the affected device. This creates a window where an attacker can send malicious traffic to protected network segments, effectively bypassing the organization's perimeter security controls.
Root Cause
The root cause is improper error handling during access control rule replication in cluster environments. When memory allocation fails during the ACL synchronization process, the affected device does not properly fail to a secure state. Instead of blocking all traffic or rejecting cluster membership until rules are fully synchronized, the device continues to operate with an incomplete ruleset. This violates the security principle of "fail secure" and allows unauthorized network access.
Attack Vector
An attacker can exploit this vulnerability by targeting a Cisco firewall cluster during periods when cluster membership changes are occurring, particularly when new devices are joining the cluster. The attack requires:
- Network Access: The attacker must be able to send network traffic that would normally pass through the firewall cluster
- Timing: The exploit is most effective during cluster join operations when memory pressure exists
- Knowledge: Understanding of which traffic should be blocked allows targeted bypass attempts
The attacker sends traffic that should be denied by the firewall's access control policies. If the traffic reaches a cluster member that has incomplete ACL replication due to the memory exhaustion condition, the traffic is incorrectly permitted through to the protected network. This allows the attacker to access internal resources, conduct reconnaissance, or launch further attacks against systems that were intended to be protected by the firewall.
Detection Methods for CVE-2026-20073
Indicators of Compromise
- Unexpected traffic patterns reaching internal network segments that should be blocked by firewall policies
- Firewall cluster nodes experiencing memory exhaustion during join operations
- ACL synchronization errors or warnings in firewall cluster logs
- Inconsistent access control rule counts between cluster members
Detection Strategies
- Monitor cluster synchronization logs for memory allocation failures during ACL replication
- Implement network traffic analysis to detect traffic that violates expected firewall policy behavior
- Configure alerts for cluster membership state changes combined with memory pressure events
- Deploy intrusion detection systems behind the firewall to catch traffic that should have been blocked
Monitoring Recommendations
- Enable detailed logging for cluster synchronization events on all ASA/FTD devices
- Monitor system memory utilization on firewall cluster members, especially during join operations
- Implement regular ACL rule count verification across all cluster members to detect synchronization failures
- Review firewall traffic logs for connections to protected resources that don't match expected access patterns
How to Mitigate CVE-2026-20073
Immediate Actions Required
- Review the Cisco Security Advisory for affected versions and available patches
- Ensure adequate memory resources are allocated to firewall cluster members before initiating cluster join operations
- Monitor cluster synchronization status closely during any cluster membership changes
- Consider temporarily isolating new cluster members from production traffic until ACL synchronization is confirmed complete
Patch Information
Cisco has released a security advisory addressing this vulnerability. Administrators should consult the Cisco Security Advisory for specific patched software versions and upgrade instructions. Apply the recommended software updates to all affected ASA and FTD devices in your environment as soon as possible.
Workarounds
- Verify ACL synchronization is complete before allowing production traffic to flow through newly joined cluster members
- Implement network segmentation behind the firewall as a defense-in-depth measure
- Configure additional access control mechanisms (host-based firewalls, application-level controls) on protected systems
- Schedule cluster maintenance operations during low-traffic periods to reduce memory pressure
# Verify cluster ACL synchronization status
show cluster info
show access-list | include elements
show cluster exec show access-list | include elements
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.


