TROYANOSYVIRUS
Retour aux CVEs

CVE-2026-20131

CRITICALCISA KEV
10.0

Description

A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FMC) Software could allow an unauthenticated, remote attacker to execute arbitrary Java code as root on an affected device. This vulnerability is due to insecure deserialization of a user-supplied Java byte stream. An attacker could exploit this vulnerability by sending a crafted serialized Java object to the web-based management interface of an affected device. A successful exploit could allow the attacker to execute arbitrary code on the device and elevate privileges to root. Note: If the FMC management interface does not have public internet access, the attack surface that is associated with this vulnerability is reduced.

Details CVE

Score CVSS v3.110.0
SeveriteCRITICAL
Vecteur CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Vecteur d'attaqueNETWORK
ComplexiteLOW
Privileges requisNONE
Interaction utilisateurNONE
Publie3/4/2026
Derniere modification3/25/2026
Sourcekev
Observations honeypot0

CISA KEV

FournisseurCisco
ProduitSecure Firewall Management Center (FMC)
Nom vulnerabiliteCisco Secure Firewall Management Center (FMC) Software and Cisco Security Cloud Control (SCC) Firewall Management Deserialization of Untrusted Data Vulnerability
Date ajout KEV2026-03-19
Date limite remediation2026-03-22
Utilise dans ransomwareKnown

Produits affectes

cisco:secure_firewall_management_center

Faiblesses (CWE)

CWE-502

Correlations IOC

Aucune correlation enregistree

This product uses data from the NVD API but is not endorsed or certified by the NVD.