Vulnslist

find the latest Cisco vulnerabilities

Cisco Secure Firewall Management Center Software RADIUS Remote Code Execution Vulnerability

cisco-sa-fmc-radius-rce-TNBKf79 · Critical · Published · Updated

A vulnerability in the RADIUS subsystem implementation of Cisco Secure Firewall Management Center (FMC) Software could allow an unauthenticated, remote attacker to inject arbitrary shell commands that are executed by the device.  This vulnerability is due to a lack of proper handling of user input during the authentication phase. An attacker could exploit this vulnerability by sending crafted input when entering credentials that will be authenticated at the configured RADIUS server. A successful exploit could allow the attacker to execute commands at a high privilege level. Note: For this vulnerability to be exploited, Cisco Secure FMC Software must be configured for RADIUS authentication for the web-based management interface, SSH management, or both. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-radius-rce-TNBKf79 This advisory is part of the August 2025 release of the Cisco Secure Firewall ASA, Secure FMC, and Secure FTD Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: August 2025 Semiannual Cisco Secure Firewall ASA, Secure FMC, and Secure FTD Software Security Advisory Bundled Publication.

Workarounds

There are no workarounds that address this vulnerability.

However, this vulnerability can be exploited only if RADIUS authentication is configured on Cisco Secure FMC Software. To mitigate this vulnerability, use another type of authentication, such as local user accounts, external LDAP authentication, or SAML single sign-on (SSO). For more information, see the Cisco Secure Firewall Management Center Administration Guide https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/admin/770/management-center-admin-77.html .

While this mitigation has been deployed and was proven successful in a test environment, customers should determine the applicability and effectiveness in their own environment and under their own use conditions. Customers should be aware that any workaround or mitigation that is implemented may negatively impact the functionality or performance of their network based on intrinsic customer deployment scenarios and limitations. Customers should not deploy any workarounds or mitigations before first evaluating the applicability to their own environment and any impact to such environment.

CVEsCVE-2025-20265
Cisco Bug IDsCSCwo91250
CVSS ScoreBase 10.0
Base 10.0 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:X/RL:X/RC:X
Product Names From Source
Cisco Firepower Management Center 7.0.7, Cisco Firepower Management Center 7.7.0, Cisco Secure Firewall Management Center (FMC), Cisco Secure Firewall Management Center (FMC) Appliances

Related Products

Product CVE Evidence
Cisco Secure Firewall Adaptive Security Appliance (ASA) Software CVE-2025-20265 Cisco OpenVuln
Cisco RV Series Routers CVE-2025-20265 Cisco OpenVuln
Cisco Nexus Dashboard CVE-2025-20265 Cisco OpenVuln
Cisco Firepower Threat Defense Software CVE-2025-20265 Cisco OpenVuln
Cisco Catalyst PON Series Switches CVE-2025-20265 Cisco OpenVuln
Cisco Secure Firewall Management Center (FMC) Appliances CVE-2025-20265 Cisco OpenVuln
Cisco Secure Firewall Management Center (FMC) CVE-2025-20265 Cisco OpenVuln
Cisco Firepower Management Center CVE-2025-20265 Cisco OpenVuln