PT-2026-22978 · Cisco · Cisco Secure Firewall Management Center (Fmc)
Brandon Sakai
·
Published
2026-03-04
·
Updated
2026-04-18
·
CVE-2026-20079
CVSS v3.1
10
Critical
| AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
Cisco Secure Firewall Management Center (FMC) (affected versions not specified)
Description
A flaw in the web interface of Cisco Secure Firewall Management Center (FMC) Software allows an unauthenticated remote attacker to bypass authentication and execute script files to gain root access to the underlying operating system. This issue stems from an improper system process created during boot time. Attackers can exploit this by sending crafted HTTP requests to the management interface. Technical analysis indicates the use of Java Byte-Stream via HTTP POST requests to trigger a deserialization process. Specifically, the
readObject() method triggers a gadget chain moving from LazyMap to InvokerTransformer, eventually executing the exec() command with root privileges. Between 300 and 700 systems are estimated to be exposed worldwide.Recommendations
Upgrade to fixed FMC versions immediately.
As a temporary workaround, restrict access to the management interface to minimize the risk of exploitation.
Fix
RCE
Authentication Bypass Using an Alternate Path or Channel
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Cisco Secure Firewall Management Center (Fmc)