Article Details
Scrape Timestamp (UTC): 2025-08-15 17:40:06.402
Source: https://www.theregister.com/2025/08/15/cisco_secure_firewall_management_bug/
Original Article Text
Click to Toggle View
Cisco's Secure Firewall Management Center now not-so secure, springs a CVSS 10 RCE hole. Switchzilla's summer of perfect 10s. Cisco has issued a patch for a maximum-severity bug in its Secure Firewall Management Center (FMC) software that could allow an unauthenticated, remote attacker to inject arbitrary shell commands on vulnerable systems. The vulnerability, tracked as CVE-2025-20265, received a critical 10.0 CVSS rating. It's caused by improper handling of user input by FMC's RADIUS authentication subsystem during the login process. Exploitation is possible only if FMC is configured to use RADIUS authentication for the web-based management interface, SSH management, or both. Cisco FMC is a centralized management platform for the vendor's network security products, including firewalls, intrusion prevention systems, URL filtering, and anti-malware tools. It's used by large enterprises, managed service providers (MSPs), government agencies, and educational institutions to manage their networks. RADIUS is an external authentication protocol used to verify users' credentials. "An attacker could exploit this vulnerability by sending crafted input when entering credentials that will be authenticated at the configured RADIUS server," Cisco warned in a Thursday security bulletin. "A successful exploit could allow the attacker to execute commands at a high privilege level." Cisco software engineer Brandon Sakai found this bug during internal security testing. As of now, Cisco isn't aware of any in-the-wild exploitation of this CVE. But it's probably just a matter of time, considering how government-backed attackers — notably those from China — like to target Cisco networking devices. So get patching. This new security hole follows a series of perfect 10 out of 10 severity bugs in Cisco products this summer. In July, Cisco released a patch for a maximum-severity bug tracked as CVE-2025-20337 in its Identity Services Engine (ISE) and ISE Passive Identity Connector (ISE-PIC) that could allow an unauthenticated, remote attacker to run arbitrary code on the operating system with root-level privileges. Cisco disclosed CVE-2025-20337 in an update to a June security advisory about two other max-severity flaws in the same products. Tracked as CVE-2025-20281 and CVE-2025-20282, these also received perfect 10s and affect ISE and ISE-PIC, allowing attackers to execute code on the underlying OS as root.
Daily Brief Summary
Cisco patched a critical vulnerability in its Secure Firewall Management Center, identified as CVE-2025-20265, which could allow remote command injection by unauthenticated attackers.
The flaw, rated a perfect 10.0 on the CVSS scale, stems from improper input handling in the RADIUS authentication subsystem during login processes.
Exploitation requires the Firewall Management Center to be configured with RADIUS authentication for web or SSH management interfaces.
Cisco's centralized management platform is widely used by enterprises, government agencies, and educational institutions, making this vulnerability a significant concern.
No active exploitation of this vulnerability has been reported, but the potential for abuse remains, especially by state-sponsored actors known to target Cisco products.
This vulnerability follows a series of maximum-severity flaws in Cisco products, prompting urgent patching across affected systems.
Cisco's internal security testing identified the flaw, emphasizing the importance of proactive vulnerability management and timely patch deployment.