PT-2026-22978 · Cisco · Cisco Secure Firewall Management Center (Fmc)
Brandon Sakai
·
Published
2026-03-04
·
Updated
2026-03-25
·
CVE-2026-20079
CVSS v3.1
10
Critical
| AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
Cisco Secure Firewall Management Center (FMC) Software (affected versions not specified)
Description
A flaw exists in the web interface of Cisco Secure Firewall Management Center (FMC) Software that could allow a remote attacker, without authentication, to bypass security checks and execute scripts on a vulnerable device. This could lead to root access to the device's operating system. The issue stems from an improperly configured system process initiated during startup. An attacker can exploit this by sending specially crafted HTTP requests to the affected device. Exploitation allows the attacker to run various scripts and commands, ultimately gaining root-level control. The exploitation process involves sending a Java Byte-Stream via an HTTP POST request, bypassing the login gate, triggering a Gadget Chain, and ultimately achieving root elevation. There is no workaround available, and organizations must upgrade to fixed versions immediately.
Recommendations
At the moment, there is no information about a newer version that contains a fix for this vulnerability.
RCE
Authentication Bypass Using an Alternate Path or Channel
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Cisco Secure Firewall Management Center (Fmc)