Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Cisco Secure Firewall Vulnerability Allows Hackers to Inject Remote Shell Command Injection

Posted on August 15, 2025August 15, 2025 By CWS

Cisco has disclosed a important safety vulnerability in its Safe Firewall Administration Middle (FMC) Software program that would enable unauthenticated attackers to execute arbitrary shell instructions with high-level privileges remotely.

The vulnerability, tracked as CVE-2025-20265 and assigned the utmost CVSS rating of 10.0, represents probably the most extreme safety flaws found in enterprise firewall infrastructure this 12 months.

The safety vulnerability resides within the RADIUS subsystem implementation of Cisco’s Safe FMC Software program, particularly affecting the authentication part the place person enter is badly dealt with.

Attackers can exploit this vulnerability by sending specifically crafted credentials throughout the RADIUS authentication course of, permitting them to inject malicious shell instructions which might be subsequently executed by the goal system.

What makes this vulnerability notably harmful is that it requires no authentication and may be exploited remotely over the community.

The vulnerability stems from inadequate enter validation throughout the credential verification course of, creating a possibility for command injection assaults when the system processes authentication requests despatched to the configured RADIUS server.

Affected Techniques and Mitigations

The vulnerability particularly impacts Cisco Safe FMC Software program releases 7.0.7 and seven.7.0, however solely when RADIUS authentication is enabled for both the web-based administration interface, SSH administration, or each. Organizations not utilizing RADIUS authentication aren’t susceptible to this specific assault vector.

ProductAffected VersionsPrerequisitesStatusCisco Safe Firewall Administration Middle (FMC) Software7.0.7RADIUS authentication enabledVulnerableCisco Safe Firewall Administration Middle (FMC) Software7.7.0RADIUS authentication enabledVulnerableCisco Safe Firewall ASA SoftwareAll versionsN/ANot AffectedCisco Safe Firewall Menace Protection (FTD) SoftwareAll versionsN/ANot Affected

Cisco has confirmed that different merchandise in its safety portfolio, together with Safe Firewall Adaptive Safety Equipment (ASA) Software program and Safe Firewall Menace Protection (FTD) Software program, aren’t affected by this vulnerability.

Not like many safety vulnerabilities that supply non permanent mitigation methods, Cisco has explicitly acknowledged that no workarounds exist for this flaw.

Nonetheless, organizations can cut back their publicity by switching to different authentication strategies comparable to native person accounts, exterior LDAP authentication, or SAML single sign-on (SSO).

This mitigation method basically requires organizations to disable RADIUS authentication solely, which can influence operational workflows and require vital configuration modifications.

Cisco has launched free software program updates that tackle the vulnerability and strongly recommends quick patching for all affected programs.

The corporate’s Product Safety Incident Response Workforce (PSIRT) has not reported any public exploitation makes an attempt or malicious use of this vulnerability within the wild.

The vulnerability was found throughout inside safety testing by Brandon Sakai of Cisco, highlighting the significance of proactive safety assessments.

This discovery is a part of Cisco’s August 2025 Semiannual Safety Advisory Bundled Publication, which incorporates a number of safety updates throughout the Safe Firewall product line.

Given the important nature of this vulnerability and its potential for distant code execution with out authentication, safety specialists suggest treating this as a priority-one patching state of affairs.

Organizations utilizing Cisco Safe FMC with RADIUS authentication ought to instantly assess their publicity and plan for emergency upkeep home windows to use the obtainable fixes.

Enhance your SOC and assist your crew defend your corporation with free top-notch menace intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Cisco, Command, Firewall, Hackers, Inject, Injection, Remote, Secure, Shell, Vulnerability

Post navigation

Previous Post: Threat Actors Personalize Phishing Attacks With Advanced Tactics for Malware Delivery
Next Post: New HTTP/2 MadeYouReset Vulnerability Enables Large-Scale DDoS Attacks

Related Posts

Clorox Sues IT Provider Cognizant For Simply Giving Employee Password to Hackers Cyber Security News
Microsoft Purview DLP to Restrict Microsoft 365 Copilot in Processing Emails With Sensitive Labels Cyber Security News
New Crocodilus Malware That Gain Complete Control of Android Device Cyber Security News
New Weaponized PyPI Package Attacking Developers to Steal Source Code Cyber Security News
MongoDB Server Pre-Authentication Vulnerability Let Attackers Trigger DoS Condition Cyber Security News
New SmartAttack Steals Sensitive Data From Air-Gapped Systems via Smartwatches Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical Flaws Patched in Rockwell FactoryTalk, Micro800, ControlLogix Products
  • Cisco Patches Critical Vulnerability in Firewall Management Platform
  • Cisco Warns of CVSS 10.0 FMC RADIUS Flaw Allowing Remote Code Execution
  • Threat Actors Attacking Windows Systems With New Multi-Stage Malware Framework PS1Bot
  • New HTTP/2 MadeYouReset Vulnerability Enables Large-Scale DDoS Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical Flaws Patched in Rockwell FactoryTalk, Micro800, ControlLogix Products
  • Cisco Patches Critical Vulnerability in Firewall Management Platform
  • Cisco Warns of CVSS 10.0 FMC RADIUS Flaw Allowing Remote Code Execution
  • Threat Actors Attacking Windows Systems With New Multi-Stage Malware Framework PS1Bot
  • New HTTP/2 MadeYouReset Vulnerability Enables Large-Scale DDoS Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News