CVE-2022-20946
Cisco Firepower Threat Defense (FTD) vulnerability analysis and mitigation

Overview

A vulnerability (CVE-2022-20946) was discovered in the generic routing encapsulation (GRE) tunnel decapsulation feature of Cisco Firepower Threat Defense (FTD) Software. The vulnerability affects FTD Software releases 6.3.0 and later, where GRE tunnel decapsulation in the LINA engine was first introduced. This security flaw allows an unauthenticated, remote attacker to cause a denial of service (DoS) condition on affected devices (Cisco Advisory).

Technical details

The vulnerability stems from a memory handling error that occurs during GRE traffic processing, specifically classified as a Heap-based Buffer Overflow (CWE-122) and Out-of-bounds Write (CWE-787). The vulnerability has received a CVSS v3.1 base score of 8.6 (High) from Cisco Systems, with a vector string of CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H, indicating network accessibility, low attack complexity, and no required privileges or user interaction (NVD).

Impact

A successful exploitation of this vulnerability results in a denial of service (DoS) condition. When exploited, the attack can cause the affected device to restart, leading to service interruption. The vulnerability affects multiple versions of Cisco Firepower Threat Defense Software, including versions 6.3.0 through 7.1.0.2 (Cisco Advisory).

Mitigation and workarounds

While there are no direct workarounds for this vulnerability, administrators can bypass decapsulation for GRE-tunneled flows through the Cisco FMC GUI by changing the GRE tunnel rule type action to Fastpath. However, this configuration will bypass the detection engine for GRE-tunneled traffic. Cisco has released software updates that address this vulnerability, and customers with service contracts are advised to obtain security fixes through their usual update channels (Cisco Advisory).

Additional resources


SourceThis report was generated using AI

Related Cisco Firepower Threat Defense (FTD) vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-20333CRITICAL9.9
  • Cisco Adaptive Security Appliance (ASA)Cisco Adaptive Security Appliance (ASA)
  • cpe:2.3:o:cisco:adaptive_security_appliance_software
YesYesSep 25, 2025
CVE-2025-20363CRITICAL9
  • Cisco Adaptive Security Appliance (ASA)Cisco Adaptive Security Appliance (ASA)
  • cpe:2.3:o:cisco:adaptive_security_appliance_software
NoYesSep 25, 2025
CVE-2025-20362HIGH8.6
  • Cisco Adaptive Security Appliance (ASA)Cisco Adaptive Security Appliance (ASA)
  • cpe:2.3:o:cisco:adaptive_security_appliance_software
YesYesSep 25, 2025
CVE-2025-20263HIGH8.6
  • Cisco Adaptive Security Appliance (ASA)Cisco Adaptive Security Appliance (ASA)
  • cpe:2.3:o:cisco:adaptive_security_appliance_software
NoYesAug 14, 2025
CVE-2025-20268MEDIUM5.8
  • Cisco Firepower Threat Defense (FTD)Cisco Firepower Threat Defense (FTD)
  • cpe:2.3:a:cisco:firepower_threat_defense
NoYesAug 14, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management