a
News
Cisco Secure Firewall Management Center Critical Vulnerabilities
5 Mar 2026

Overview
CVE: CVE-2026-20079, CVE-2026-20131
Severity: Critical
Date: 05 March 2026
Summary
Cisco has released security advisories for two critical vulnerabilities affecting Cisco Secure Firewall Management Center (FMC). Both vulnerabilities allow unauthenticated, remote attackers to obtain root-level access to affected devices via the web-based management interface. Immediate remediation is strongly recommended.
Affected Version
Cisco Secure Firewall Management Center (FMC) Software
Vulnerability Breakdown
CVE-2026-20079 - Improper System Process
Severity: Critical
CVSS: 10.0
Description: A vulnerability in the web interface of FMC Software could allow an unauthenticated, remote attacker to bypass authentication and execute script files. The issue is due to an improper system process created at boot time.
Impact: Successful exploitation could allow execution of scripts and commands, resulting in root access to the underlying operating system.
Conditions: Remote access to the FMC web interface; no authentication required.
CVE-2026-20131 - Insecure Deserialisation
Severity: Critical
CVSS: 10.0
Description: A vulnerability in the web-based management interface could allow an unauthenticated, remote attacker to execute arbitrary Java code as root. The vulnerability is due to insecure deserialisation of a user-supplied Java byte stream.
Impact: Successful exploitation could allow arbitrary code execution and privilege escalation to root.
Conditions: Remote access to the FMC web interface; no authentication required.
Note: If the FMC management interface is not exposed to the public internet, the attack surface is reduced.
Mitigation
Upgrade affected Cisco Secure Firewall Management Center systems to the fixed software versions provided in Cisco’s advisories.
Restrict exposure of the FMC web-based management interface, particularly from untrusted or public networks.
Review access controls for management interfaces until patching is completed.
Summary for IT Teams
Product: Cisco Secure Firewall Management Center (FMC)
Threat Level: Critical
Risk: Unauthenticated remote root access and arbitrary code execution
Action Required:
Identify exposed FMC instances.
Upgrade to Cisco’s fixed releases immediately.
Restrict public or untrusted network access to the FMC web interface.
Reference
Need Help?
If your organisation needs assistance assessing or patching your environment, the Secure ISS SOC team is ready to help. Please get in touch on 1300 769 460 or email us.

