Cisco Alerts Users to Critical CVSS 10.0 FMC RADIUS Vulnerability Enabling Remote Code Execution

Published:

spot_img

Cisco Issues Critical Security Update for Firewall Management Center

On August 15, 2025, Cisco announced important security updates aimed at addressing a critical vulnerability in its Secure Firewall Management Center (FMC) Software. This flaw could potentially enable malicious actors to execute arbitrary code on affected systems, putting organizations at significant risk.

Understanding the Vulnerability

The vulnerability, identified as CVE-2025-20265, boasts a CVSS score of 10.0, marking it as a major security concern. This issue primarily affects the RADIUS subsystem within the software. Essentially, it allows unauthenticated remote attackers to inject arbitrary shell commands that the device executes. The root of the problem lies in improper handling of user input during the authentication phase.

Cisco’s advisory details how an attacker could exploit this weakness by sending specially crafted inputs when attempting to enter credentials, taking advantage of the authentication process with the configured RADIUS server. The potential for exploitation is high, as a successful breach could grant an attacker command execution at elevated privilege levels.

Affected Versions and Mitigation

Organizations utilizing Cisco Secure FMC Software releases 7.0.7 and 7.7.0 that have RADIUS authentication enabled for web-based management or SSH management are particularly at risk. Cisco has made it clear that the only effective mitigation at this time is to apply the patches provided. No workarounds exist for this specific vulnerability.

Brandon Sakai, a member of Cisco’s security team, is credited with discovering this issue during internal security testing, underscoring the importance of proactive security assessments.

Additional High-Severity Vulnerabilities

In addition to CVE-2025-20265, Cisco has addressed several other high-severity vulnerabilities in this latest update:

  • CVE-2025-20217 (CVSS score: 8.6): A denial-of-service vulnerability in Cisco Secure Firewall Threat Defense Software Snort 3.
  • CVE-2025-20222 (CVSS score: 8.6): A denial-of-service vulnerability affecting the Cisco Secure Firewall Adaptive Security Appliance and Threat Defense Software for the Firepower 2100 Series over IPv6.
  • Multiple CVE-2025-20224, CVE-2025-20225, and CVE-2025-20239 (CVSS score: 8.6): Denial-of-service vulnerabilities in Cisco IOS, IOS XE, Adaptive Security Appliance, and Threat Defense Software focusing on IKEv2.
  • CVE-2025-20133, CVE-2025-20243 (CVSS score: 8.6): Denial-of-service vulnerabilities tied to remote access SSL VPNs on certain Cisco Secure Firewall appliances.
  • CVE-2025-20134 (CVSS score: 8.6): A denial-of-service vulnerability concerning SSL/TLS certificates in various firewall software.
  • CVE-2025-20136 (CVSS score: 8.6): A vulnerability affecting network address translation DNS inspections, which could also lead to denial of service.
  • CVE-2025-20263 (CVSS score: 8.6): A denial-of-service vulnerability impacting web services within the Cisco Secure Firewall ecosystem.
  • Various high-severity bugs like CVE-2025-20148 and CVE-2025-20127, which threaten other critical functionalities.

While these vulnerabilities have not yet been reported as actively exploited, the nature of network appliances makes them appealing targets for attackers. With cyber threats continuously evolving, Cisco recommends that users update their systems to the latest versions as a critical precaution.

Taking Action

Organizations using Cisco products are advised to prioritize the application of these updates to ensure their network defense mechanisms are robust and secure. By addressing these vulnerabilities promptly, companies can protect their systems from potential exploits and safeguard sensitive information. Stay informed on security best practices and ensure your software remains up to date.

spot_img

Related articles

Recent articles

Registration Opens for Future Crime Summit 2026, India’s Largest Cybercrime Conference

Registration Opens for Future Crime Summit 2026, India’s Largest Cybercrime Conference NEW DELHI — The Future Crime Summit 2026 has officially opened for registration, marking...

Tech Industry Faces 73,200 Job Cuts in Q1 2026 Amid Major Restructuring by Meta, Oracle, and Snap

Tech Industry Faces 73,200 Job Cuts in Q1 2026 Amid Major Restructuring by Meta, Oracle, and Snap New Delhi | The global technology sector is...

Awqaf Investment and TAIBA Strengthen Hospitality Sector with Inauguration of Makarem Burj Al Madinah Hotel & Suites

Awqaf Investment and TAIBA Strengthen Hospitality Sector with Inauguration of Makarem Burj Al Madinah Hotel & Suites Al-Madinah Al-Munawwarah: The recent inauguration of the Makarem...

High-Profile Raids Spark Crisis: Are IAS, IPS, and IRS Officers Losing Credibility?

High-Profile Raids Spark Crisis: Are IAS, IPS, and IRS Officers Losing Credibility? A surge in high-profile raids, arrests, and asset seizures involving India's elite civil...