Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
10.0

Cisco Secure Firewall Management Center: Unauthenticated Remote Code Execution

CVE-2026-20079
Summary

An attacker can bypass login and run malicious scripts on your firewall's management system, gaining full control of the device. This is a serious risk because it can be exploited by anyone, without needing a password. Cisco has not yet released a fix, so it's essential to carefully evaluate and apply patches or workarounds as soon as they become available.

Original title
A vulnerability in the web interface of Cisco Secure Firewall Management Center (FMC) Software could allow an unauthenticated, remote attacker to bypass authentication and execute script files on a...
Original description
A vulnerability in the web interface of Cisco Secure Firewall Management Center (FMC) Software could allow an unauthenticated, remote attacker to bypass authentication and execute script files on an affected device to obtain root access to the underlying operating system.

This vulnerability is due to an improper system process that is created at boot time. An attacker could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute a variety of scripts and commands that allow root access to the device.
nvd CVSS3.1 10.0
Vulnerability type
CWE-288 Authentication Bypass Using Alternate Path
Published: 4 Mar 2026 · Updated: 13 Mar 2026 · First seen: 6 Mar 2026