Cisco fixed maximum-severity security flaw in Secure Firewall Management Center
Cisco修复了Secure Firewall Management Center的一个最高级安全漏洞(CVSS 10.0),该漏洞允许未认证远程攻击者执行任意代码。该漏洞影响版本7.0.7和7.7.0,需RADIUS认证开启才可被利用。目前未发现攻击实例。 2025-8-15 08:31:41 Author: securityaffairs.com(查看原文) 阅读量:12 收藏

Cisco fixed maximum-severity security flaw in Secure Firewall Management Center

Cisco patches critical Secure Firewall Management Center flaw allowing remote code execution on vulnerable systems.

Cisco released security updates to address a maximum-severity security vulnerability, tracked as CVE-2025-20265 (CVSS score of 10.0), in Secure Firewall Management Center (FMC) Software.

The vulnerability affects the RADIUS subsystem implementation of Cisco Secure Firewall Management Center (FMC) Software.

An unauthenticated, remote attacker can exploit the flaw to execute arbitrary code on affected systems.

The flaw stems from improper input handling during authentication, allowing attackers to send crafted credentials to the configured RADIUS server.

“A vulnerability in the RADIUS subsystem implementation of Cisco Secure Firewall Management Center (FMC) Software could allow an unauthenticated, remote attacker to inject arbitrary shell commands that are executed by the device.” reads the advisory. “This vulnerability is due to a lack of proper handling of user input during the authentication phase. An attacker could exploit this vulnerability by sending crafted input when entering credentials that will be authenticated at the configured RADIUS server. A successful exploit could allow the attacker to execute commands at a high privilege level.”

Brandon Sakai of Cisco discovered the flaw during internal security testing

The flaw affects Cisco Secure FMC Software versions 7.0.7 and 7.7.0 with RADIUS authentication enabled. ASA and FTD software are not impacted.

The tech giant warns that there is no workaround; however, the flaw is exploitable only if RADIUS authentication is enabled. Mitigation involves switching to local, LDAP, or SAML SSO authentication, after assessing its impact on the specific environment.

The Cisco Product Security Incident Response Team (PSIRT) is not aware of attacks in the wild exploiting this flaw.

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, Secure Firewall Management Center)




文章来源: https://securityaffairs.com/181182/security/cisco-fixed-maximum-severity-security-flaw-in-secure-firewall-management-center.html
如有侵权请联系:admin#unsafe.sh