Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Cisco Secure Firewall Vulnerability Allows Hackers to Inject Remote Shell Command Injection

Posted on August 15, 2025August 15, 2025 By CWS

Cisco has disclosed a important safety vulnerability in its Safe Firewall Administration Middle (FMC) Software program that would enable unauthenticated attackers to execute arbitrary shell instructions with high-level privileges remotely.

The vulnerability, tracked as CVE-2025-20265 and assigned the utmost CVSS rating of 10.0, represents probably the most extreme safety flaws found in enterprise firewall infrastructure this 12 months.

The safety vulnerability resides within the RADIUS subsystem implementation of Cisco’s Safe FMC Software program, particularly affecting the authentication part the place person enter is badly dealt with.

Attackers can exploit this vulnerability by sending specifically crafted credentials throughout the RADIUS authentication course of, permitting them to inject malicious shell instructions which might be subsequently executed by the goal system.

What makes this vulnerability notably harmful is that it requires no authentication and may be exploited remotely over the community.

The vulnerability stems from inadequate enter validation throughout the credential verification course of, creating a possibility for command injection assaults when the system processes authentication requests despatched to the configured RADIUS server.

Affected Techniques and Mitigations

The vulnerability particularly impacts Cisco Safe FMC Software program releases 7.0.7 and seven.7.0, however solely when RADIUS authentication is enabled for both the web-based administration interface, SSH administration, or each. Organizations not utilizing RADIUS authentication aren’t susceptible to this specific assault vector.

ProductAffected VersionsPrerequisitesStatusCisco Safe Firewall Administration Middle (FMC) Software7.0.7RADIUS authentication enabledVulnerableCisco Safe Firewall Administration Middle (FMC) Software7.7.0RADIUS authentication enabledVulnerableCisco Safe Firewall ASA SoftwareAll versionsN/ANot AffectedCisco Safe Firewall Menace Protection (FTD) SoftwareAll versionsN/ANot Affected

Cisco has confirmed that different merchandise in its safety portfolio, together with Safe Firewall Adaptive Safety Equipment (ASA) Software program and Safe Firewall Menace Protection (FTD) Software program, aren’t affected by this vulnerability.

Not like many safety vulnerabilities that supply non permanent mitigation methods, Cisco has explicitly acknowledged that no workarounds exist for this flaw.

Nonetheless, organizations can cut back their publicity by switching to different authentication strategies comparable to native person accounts, exterior LDAP authentication, or SAML single sign-on (SSO).

This mitigation method basically requires organizations to disable RADIUS authentication solely, which can influence operational workflows and require vital configuration modifications.

Cisco has launched free software program updates that tackle the vulnerability and strongly recommends quick patching for all affected programs.

The corporate’s Product Safety Incident Response Workforce (PSIRT) has not reported any public exploitation makes an attempt or malicious use of this vulnerability within the wild.

The vulnerability was found throughout inside safety testing by Brandon Sakai of Cisco, highlighting the significance of proactive safety assessments.

This discovery is a part of Cisco’s August 2025 Semiannual Safety Advisory Bundled Publication, which incorporates a number of safety updates throughout the Safe Firewall product line.

Given the important nature of this vulnerability and its potential for distant code execution with out authentication, safety specialists suggest treating this as a priority-one patching state of affairs.

Organizations utilizing Cisco Safe FMC with RADIUS authentication ought to instantly assess their publicity and plan for emergency upkeep home windows to use the obtainable fixes.

Enhance your SOC and assist your crew defend your corporation with free top-notch menace intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Cisco, Command, Firewall, Hackers, Inject, Injection, Remote, Secure, Shell, Vulnerability

Post navigation

Previous Post: Threat Actors Personalize Phishing Attacks With Advanced Tactics for Malware Delivery
Next Post: New NFC-Driven PhantomCard Android Malware Attacking Banking Users

Related Posts

Metasploit Module Released For Actively Exploited SharePoint 0-Day Vulnerabilities Cyber Security News
Critical GoAnywhere MFT Platform Vulnerability Exposes Enterprises to Remote Exploitation Cyber Security News
Multiple vtenext Vulnerabilities Let Attackers Bypass Authentication and Execute Remote Codes Cyber Security News
Beware of Weaponized MSI Installer Mimic as WhatsApp Delivers Modified XWorm RAT Cyber Security News
PLA Rapidly Deploys AI Technology Across Military Intelligence Operations Cyber Security News
North Korean Hackers Weaponized 67 Malicious npm Packages to Deliver XORIndex Malware Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News