26.2 C
New York
Saturday, August 16, 2025

Buy now

Cisco patches critical security hole in Firewall Management Center – act now

ZDNET’s key takeaways

  • Cisco’s Safe Firewall Administration Middle safety gap is as unhealthy as they get.
  • There isn’t a mitigation and no workaround. Patch instantly.
  • To date, no confirmed lively exploits have been confirmed.

Get extra in-depth ZDNET tech protection: Add us as a most popular Google supply on Chrome and Chromium browsers.


Do you employ Cisco’s Safe Firewall Administration Middle (FMC) software program? If your organization operates a severe community utilizing Cisco merchandise — and with Cisco’s 76%+ market share of high-end networking, likelihood is that you simply do — you will need to patch it. Not over the weekend. Not Monday. Proper now.

Cisco has simply patched a vital command injection vulnerability (CVE-2025-20265) in FMC. How vital is vital? Let’s put it this fashion: It has a Widespread Vulnerability Scoring System (CVSS) rating of 10.0, which is the best attainable threat score in vulnerability scoring. Particularly, the flaw impacts FMC variations 7.0.7 and seven.7.0 which were configured for RADIUS authentication on the web-based or SSH administration interface.

RADIUS is the de facto commonplace for community authentication. It is the most typical implementation used to allow 802.1X entry management administration. In different phrases, for those who use FMC, it is nearly a certainty you are utilizing RADIUS, which suggests you are weak.

The issue is that as a result of the software program did not sanitize person enter within the RADIUS authentication section, attackers can ship crafted credentials that will likely be executed as high-privileged shell instructions. If abused accurately, this may grant anybody full management over the firewall administration middle.

See also  The Many Faces of Reinforcement Learning: Shaping Large Language Models

Including insult to harm, attackers can exploit the flaw with none prior system entry or legitimate credentials. I repeat: with none prior system entry or legitimate credentials.

This can be a safety nightmare. As soon as a hacker has full management over firewall administration, they’ll do just about something they need to each the firewall and the remainder of your community.

The one bit of excellent information is that Cisco Safe Firewall Adaptive Safety Equipment (ASA) Software program and Cisco Safe Firewall Menace Protection (FTD) Software program aren’t affected. 

Oh, and by the way in which, Cisco states, “There are not any workarounds that handle this vulnerability.” You should patch this system. Now. 

Cisco studies that there have been no confirmed lively exploits within the wild up to now. Give it time. The data within the safety report is greater than sufficient for a intelligent hacker to determine tips on how to exploit this safety gap.

So, as soon as extra and with feeling, patch it. Patch it now. 

Cisco prospects with service contracts that entitle them to common software program updates ought to receive safety fixes by their typical replace channels. Nonetheless, given how deep this gap goes, Cisco can be providing the patch free of charge. In both case, take the next steps:

  1. Go to the official Cisco Safety Advisory for CVE-2025-20265.

  2. Log in along with your Cisco account linked to your group’s assist contract.

  3. Use the Cisco Software program Checker instrument or examine the Obtain part of the advisory to determine the particular mounted launch to your equipment/model.

  4. Obtain and set up the FMC software program replace to your deployment — patched variations for 7.0.7 and seven.7.0 are supplied.

See also  OpenAI to release open-source model as AI economics force strategic shift

You understand what to do now. Get on with it. 

Supply hyperlink

Related Articles

Leave a Reply

Please enter your comment!
Please enter your name here

Latest Articles