CVE-2026-20079 PUBLISHED

Assigner: cisco
Reserved: 08.10.2025 Published: 04.03.2026 Updated: 05.03.2026

A vulnerability in the web interface of Cisco Secure Firewall Management Center (FMC) Software could allow an unauthenticated, remote attacker to bypass authentication and execute script files on an affected device to obtain root access to the underlying operating system.

This vulnerability is due to an improper system process that is created at boot time. An attacker could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute a variety of scripts and commands that allow root access to the device.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
CVSS Score: 10

Product Status

Vendor Cisco
Product Cisco Secure Firewall Management Center (FMC)
Versions
  • Version 7.0.0 is affected
  • Version 7.0.0.1 is affected
  • Version 7.0.1 is affected
  • Version 7.0.1.1 is affected
  • Version 7.0.2 is affected
  • Version 7.0.2.1 is affected
  • Version 7.0.3 is affected
  • Version 7.0.4 is affected
  • Version 7.0.5 is affected
  • Version 7.0.6 is affected
  • Version 7.0.6.1 is affected
  • Version 7.0.6.2 is affected
  • Version 7.0.6.3 is affected
  • Version 7.0.7 is affected
  • Version 7.0.8 is affected
  • Version 7.0.8.1 is affected
  • Version 7.1.0 is affected
  • Version 7.1.0.1 is affected
  • Version 7.1.0.2 is affected
  • Version 7.1.0.3 is affected
  • Version 7.2.0 is affected
  • Version 7.2.1 is affected
  • Version 7.2.2 is affected
  • Version 7.2.0.1 is affected
  • Version 7.2.3 is affected
  • Version 7.2.3.1 is affected
  • Version 7.2.4 is affected
  • Version 7.2.4.1 is affected
  • Version 7.2.5 is affected
  • Version 7.2.5.1 is affected
  • Version 7.2.6 is affected
  • Version 7.2.7 is affected
  • Version 7.2.5.2 is affected
  • Version 7.2.8 is affected
  • Version 7.2.8.1 is affected
  • Version 7.2.9 is affected
  • Version 7.2.10 is affected
  • Version 7.2.10.2 is affected
  • Version 7.2.10.1 is affected
  • Version 7.3.0 is affected
  • Version 7.3.1 is affected
  • Version 7.3.1.1 is affected
  • Version 7.3.1.2 is affected
  • Version 7.4.0 is affected
  • Version 7.4.1 is affected
  • Version 7.4.1.1 is affected
  • Version 7.4.2 is affected
  • Version 7.4.2.1 is affected
  • Version 7.4.2.2 is affected
  • Version 7.4.2.3 is affected
  • Version 7.4.2.4 is affected
  • Version 7.4.3 is affected
  • Version 7.6.0 is affected
  • Version 7.6.1 is affected
  • Version 7.6.2 is affected
  • Version 7.6.2.1 is affected
  • Version 7.6.3 is affected
  • Version 7.7.0 is affected
  • Version 7.7.10 is affected
  • Version 7.7.10.1 is affected
  • Version 7.7.11 is affected

Exploits

The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.

References

Problem Types

  • Authentication Bypass Using an Alternate Path or Channel cwe