- Cisco found a 10/10 flaw in a secure firewall management center
- He published a patch and advised possible attenuations
- No proof of abuse in the jumps so far, but users should always be in custody
Cisco recently corrected a vulnerability of maximum severity in its product Secure Firewall Management Center (FMC), and urged users to be applied either the fix or attenuation, as soon as possible.
FMC is a centralized platform for configuring, monitoring and analyzing Cisco Secure Firewls, where users can manage policies, follow the intelligence of threats and monitor their deployments on termination points.
According to the new Cisco security advice, vulnerability has been discovered in the implementation of the FMC Radius subsystem. Radius (remote authentication user service) is a protocol used to authenticate, authorize and take account of FMC administrators and VPN users by integrating into an external identity server.
Correction and attenuations
The flaw is described as an “incorrect manipulation of the user input during the authentication bug” which could allow an non -authenticated distant attacker to inject arbitrary shell commands.
In theory, this could be done by sending entries designed when entering identification information – but the warning here is that FMC must be configured for the raying authentication for the management interface based on the web, SSH or both, so that the bug is operator.
The bad news is that, according to Bleeping CompomputeThis configuration is “commonly used” in corporate and government networks where administrators want a centralized connection control and taking into account access to network devices. Therefore, the attack surface could be quite large and the victims high.
It is now followed as CVE-2025-20265 and has received a gravity score of 10/10 (criticism).
Cisco has published a fix to resolve the problem, and said that those who cannot apply it should deactivate the ray authentication and replace it with a different method, such as local user accounts, the external or similar LDAP. The company also said that attenuations have proven to be good in the tests, but warned customers to perform the tests themselves.
Via Bleeping Compompute