Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

Cisco's FMC Vulnerability: A New Perfect 10 Bug to Worry About


Cisco's FMC Vulnerability: A New Perfect 10 Bug to Worry About

  • Cisco has identified a new perfect 10 bug (CVE-2025-20265) in its Secure Firewall Management Center (FMC) software.
  • The vulnerability allows an unauthenticated, remote attacker to inject arbitrary shell commands on vulnerable systems.
  • The issue is caused by improper handling of user input during the login process.
  • Cisco has released a patch for this bug, and users are advised to apply it as soon as possible.


  • Cisco has just added another perfect 10 bug to its list of summer vulnerabilities, this time targeting the Secure Firewall Management Center (FMC) software. In a latest security bulletin, the company warned that a maximum-severity vulnerability, tracked as CVE-2025-20265, could allow an unauthenticated, remote attacker to inject arbitrary shell commands on vulnerable systems.

    The vulnerability is caused by improper handling of user input by FMC's RADIUS authentication subsystem during the login process. Exploitation is possible only if FMC is configured to use RADIUS authentication for the web-based management interface, SSH management, or both. This bug received a critical 10.0 CVSS rating, indicating that it has the highest level of severity.

    The Secure Firewall Management Center (FMC) software is a centralized management platform used by large enterprises, managed service providers (MSPs), government agencies, and educational institutions to manage their networks. It's used in conjunction with various Cisco network security products such as firewalls, intrusion prevention systems, URL filtering, and anti-malware tools.

    "An attacker could exploit this vulnerability by sending crafted input when entering credentials that will be authenticated at the configured RADIUS server," warned Cisco in its latest security bulletin. "A successful exploit could allow the attacker to execute commands at a high privilege level."

    This is not the first time this year that Cisco has faced criticism for its network security products, as it has already released patches for two perfect 10 bugs in its Identity Services Engine (ISE) components and was targeted by government-backed attackers from China. The latest vulnerability highlights the importance of timely patching and robust network security measures to prevent such attacks.

    As of now, Cisco isn't aware of any in-the-wild exploitation of this CVE, but it's probably just a matter of time, considering how quickly these types of vulnerabilities can be exploited by skilled attackers. Therefore, it's crucial for users of FMC software to apply the patch as soon as possible and follow best practices to prevent such attacks.

    In conclusion, Cisco has identified another critical vulnerability in its network security products, which highlights the importance of ongoing patching and robust security measures to prevent such attacks. While no one is immune to vulnerabilities, taking proactive steps can significantly reduce the risk of falling prey to these types of cyberattacks.

    Related Information:
  • https://www.ethicalhackingnews.com/articles/Ciscos-FMC-Vulnerability-A-New-Perfect-10-Bug-to-Worry-About-ehn.shtml

  • https://go.theregister.com/feed/www.theregister.com/2025/08/15/cisco_secure_firewall_management_bug/

  • https://www.msn.com/en-us/news/technology/ciscos-secure-firewall-management-center-now-not-so-secure-springs-a-cvss-10-rce-hole/ar-AA1KBxhQ

  • https://www.bleepingcomputer.com/news/security/cisco-warns-of-max-severity-flaw-in-firewall-management-center/

  • https://nvd.nist.gov/vuln/detail/CVE-2025-20265

  • https://www.cvedetails.com/cve/CVE-2025-20265/


  • Published: Fri Aug 15 15:16:38 2025 by llama3.2 3B Q4_K_M













    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us