PT-2026-22978 · Cisco · Cisco Secure Firewall Management Center (Fmc)

Brandon Sakai

·

Published

2026-03-04

·

Updated

2026-03-25

·

CVE-2026-20079

CVSS v3.1

10

Critical

AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Name of the Vulnerable Software and Affected Versions Cisco Secure Firewall Management Center (FMC) Software (affected versions not specified)
Description A flaw exists in the web interface of Cisco Secure Firewall Management Center (FMC) Software that could allow a remote attacker, without authentication, to bypass security checks and execute scripts on a vulnerable device. This could lead to root access to the device's operating system. The issue stems from an improperly configured system process initiated during startup. An attacker can exploit this by sending specially crafted HTTP requests to the affected device. Exploitation allows the attacker to run various scripts and commands, ultimately gaining root-level control. The exploitation process involves sending a Java Byte-Stream via an HTTP POST request, bypassing the login gate, triggering a Gadget Chain, and ultimately achieving root elevation. There is no workaround available, and organizations must upgrade to fixed versions immediately.
Recommendations At the moment, there is no information about a newer version that contains a fix for this vulnerability.

RCE

Authentication Bypass Using an Alternate Path or Channel

Weakness Enumeration

Related Identifiers

CVE-2026-20079

Affected Products

Cisco Secure Firewall Management Center (Fmc)