PT-2026-22984 · Cisco · Cisco Secure Firewall Management Center
Keane Okelley
·
Published
2026-03-04
·
Updated
2026-03-19
·
CVE-2026-20131
CVSS v3.1
10
Critical
| AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
Cisco Secure Firewall Management Center (FMC) Software (affected versions not specified)
Description
A flaw exists in the web-based management interface of Cisco Secure Firewall Management Center (FMC) Software that could allow a remote attacker who does not need to be authenticated to execute arbitrary Java code with root privileges on a vulnerable device. This is due to insecure deserialization of a user-supplied Java byte stream. An attacker could exploit this by sending a specially crafted serialized Java object to the web-based management interface. Successful exploitation could allow the attacker to execute code and gain root access. It is noted that if the FMC management interface does not have public internet access, the attack surface is reduced. Approximately 62,000 services are estimated to be exposed.
Recommendations
At the moment, there is no information about a newer version that contains a fix for this vulnerability.
RCE
Deserialization of Untrusted Data
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Cisco Secure Firewall Management Center