PT-2026-22978 · Cisco · Cisco Secure Firewall Management Center (Fmc)

Brandon Sakai

·

Published

2026-03-04

·

Updated

2026-04-18

·

CVE-2026-20079

CVSS v3.1

10

Critical

AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Name of the Vulnerable Software and Affected Versions Cisco Secure Firewall Management Center (FMC) (affected versions not specified)
Description A flaw in the web interface of Cisco Secure Firewall Management Center (FMC) Software allows an unauthenticated remote attacker to bypass authentication and execute script files to gain root access to the underlying operating system. This issue stems from an improper system process created during boot time. Attackers can exploit this by sending crafted HTTP requests to the management interface. Technical analysis indicates the use of Java Byte-Stream via HTTP POST requests to trigger a deserialization process. Specifically, the readObject() method triggers a gadget chain moving from LazyMap to InvokerTransformer, eventually executing the exec() command with root privileges. Between 300 and 700 systems are estimated to be exposed worldwide.
Recommendations Upgrade to fixed FMC versions immediately. As a temporary workaround, restrict access to the management interface to minimize the risk of exploitation.

Fix

RCE

Authentication Bypass Using an Alternate Path or Channel

Weakness Enumeration

Related Identifiers

CVE-2026-20079

Affected Products

Cisco Secure Firewall Management Center (Fmc)