CVE-2026-20079
CVE-2026-20131
March 5, 2026
·
0
Minutes Read

Cisco Secure Firewall Management Center (FMC) Authentication Bypass and RCE Vulnerabilities

Security Advisory
March 5, 2026
·
0
Minutes Read

Cisco Secure Firewall Management Center (FMC) Authentication Bypass and RCE Vulnerabilities

Security Advisory
March 5, 2026
·
0
Minutes Read
Kudelski Security Team
Find out more
table of contents
Share on
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Summary

Two critical vulnerabilities have been identified in the web-based management interface of Cisco Secure Firewall Management Center (FMC) that could allow an unauthenticated remote attacker to compromise affected systems.

The vulnerabilities tracked as CVE-2026-20079 and CVE-2026-20131 could allow attackers to bypass authentication or execute arbitrary code on the affected device. Successful exploitation may allow attackers to run commands or Java code and obtain root-level access to the underlying operating system.

Cisco has released software updates to address these vulnerabilities. At the time of publication, no workarounds are available.

Affected Systems and/or Applications

The following products are affected:

  • Cisco Secure Firewall Management Center (FMC) Software

Additionally, the following service is affected by CVE-2026-20131:

  • Cisco Security Cloud Control (SCC) Firewall Management

The following products are confirmed not vulnerable:

  • Cisco Secure Firewall Adaptive Security Appliance (ASA) Software
  • Cisco Secure Firewall Threat Defense (FTD) Software
  • Cisco Cloud-Delivered Firewall Management Center (cdFMC)

Note: Cisco Security Cloud Control Firewall Management is a SaaS-delivered service and is automatically updated by Cisco.

Technical Details

Two separate vulnerabilities affect the FMC web-based management interface.

CVE-2026-20079 -- Authentication Bypass

This vulnerability is caused by an improperly created system process during device boot. An attacker could exploit this flaw by sending crafted HTTP requests to the affected device. Successful exploitation could allow an attacker to bypass authentication controls and execute scripts or commands on the system, potentially resulting in root-level access.

CVE-2026-20131 -- Remote Code Execution

This vulnerability results from insecure deserialization of a user-supplied Java byte stream in the web management interface. An attacker could send a crafted serialized Java object to the management interface of an affected device. If successful, the attacker could execute arbitrary Java code and escalate privileges to root. The risk associated with these vulnerabilities increases if the FMC management interface is accessible from untrusted networks or the public internet.

Mitigation

Cisco has released software updates that address CVE-2026-20079 and CVE-2026-20131. Organizations should take the following actions:

  • Upgrade to the latest fixed version of Cisco Secure Firewall Management Center (FMC).
  • Use the Cisco Software Checker to determine whether deployed software versions are vulnerable and identify the earliest fixed release.
  • Restrict access to the FMC web management interface to trusted internal networks.
  • Ensure the management interface is not exposed to the publicinternet.
  • Monitor system logs and network traffic for suspicious or unauthorized access attempts targeting the FMC management interface.

Because no workarounds are available, upgrading to a fixed software release is required to fully remediate these vulnerabilities.

What the Cyber Fusion Center is Doing

The Cyber Fusion Center (CFC) is monitoring the situation. This advisory will be updated if required or when more information becomes available.

References

Related Post