Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Cisco Secure Firewall Vulnerability Allows Hackers to Inject Remote Shell Command Injection

Posted on August 15, 2025August 15, 2025 By CWS

Cisco has disclosed a important safety vulnerability in its Safe Firewall Administration Middle (FMC) Software program that would enable unauthenticated attackers to execute arbitrary shell instructions with high-level privileges remotely.

The vulnerability, tracked as CVE-2025-20265 and assigned the utmost CVSS rating of 10.0, represents probably the most extreme safety flaws found in enterprise firewall infrastructure this 12 months.

The safety vulnerability resides within the RADIUS subsystem implementation of Cisco’s Safe FMC Software program, particularly affecting the authentication part the place person enter is badly dealt with.

Attackers can exploit this vulnerability by sending specifically crafted credentials throughout the RADIUS authentication course of, permitting them to inject malicious shell instructions which might be subsequently executed by the goal system.

What makes this vulnerability notably harmful is that it requires no authentication and may be exploited remotely over the community.

The vulnerability stems from inadequate enter validation throughout the credential verification course of, creating a possibility for command injection assaults when the system processes authentication requests despatched to the configured RADIUS server.

Affected Techniques and Mitigations

The vulnerability particularly impacts Cisco Safe FMC Software program releases 7.0.7 and seven.7.0, however solely when RADIUS authentication is enabled for both the web-based administration interface, SSH administration, or each. Organizations not utilizing RADIUS authentication aren’t susceptible to this specific assault vector.

ProductAffected VersionsPrerequisitesStatusCisco Safe Firewall Administration Middle (FMC) Software7.0.7RADIUS authentication enabledVulnerableCisco Safe Firewall Administration Middle (FMC) Software7.7.0RADIUS authentication enabledVulnerableCisco Safe Firewall ASA SoftwareAll versionsN/ANot AffectedCisco Safe Firewall Menace Protection (FTD) SoftwareAll versionsN/ANot Affected

Cisco has confirmed that different merchandise in its safety portfolio, together with Safe Firewall Adaptive Safety Equipment (ASA) Software program and Safe Firewall Menace Protection (FTD) Software program, aren’t affected by this vulnerability.

Not like many safety vulnerabilities that supply non permanent mitigation methods, Cisco has explicitly acknowledged that no workarounds exist for this flaw.

Nonetheless, organizations can cut back their publicity by switching to different authentication strategies comparable to native person accounts, exterior LDAP authentication, or SAML single sign-on (SSO).

This mitigation method basically requires organizations to disable RADIUS authentication solely, which can influence operational workflows and require vital configuration modifications.

Cisco has launched free software program updates that tackle the vulnerability and strongly recommends quick patching for all affected programs.

The corporate’s Product Safety Incident Response Workforce (PSIRT) has not reported any public exploitation makes an attempt or malicious use of this vulnerability within the wild.

The vulnerability was found throughout inside safety testing by Brandon Sakai of Cisco, highlighting the significance of proactive safety assessments.

This discovery is a part of Cisco’s August 2025 Semiannual Safety Advisory Bundled Publication, which incorporates a number of safety updates throughout the Safe Firewall product line.

Given the important nature of this vulnerability and its potential for distant code execution with out authentication, safety specialists suggest treating this as a priority-one patching state of affairs.

Organizations utilizing Cisco Safe FMC with RADIUS authentication ought to instantly assess their publicity and plan for emergency upkeep home windows to use the obtainable fixes.

Enhance your SOC and assist your crew defend your corporation with free top-notch menace intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Cisco, Command, Firewall, Hackers, Inject, Injection, Remote, Secure, Shell, Vulnerability

Post navigation

Previous Post: Threat Actors Personalize Phishing Attacks With Advanced Tactics for Malware Delivery
Next Post: Threat Actors Attacking Windows Systems With New Multi-Stage Malware Framework PS1Bot

Related Posts

Researchers Details Masking Malicious Scripts and Bypass Defense Mechanisms Cyber Security News
Rockwell Arena Simulation Vulnerabilities Let Attackers Execute Malicious Code Remotely Cyber Security News
PupkinStealer Attacks Windows System to Steal Login Credentials & Desktop Files Cyber Security News
Triple Combo – Kimsuky Hackers Attack Facebook, Email, and Telegram Users Cyber Security News
OpenAI is to Launch a AI Web Browser in Coming Weeks Cyber Security News
CodeSign Secure v3.02: Future of Code Signing with PQC Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Threat Actors Attacking Windows Systems With New Multi-Stage Malware Framework PS1Bot
  • Cisco Secure Firewall Vulnerability Allows Hackers to Inject Remote Shell Command Injection
  • Threat Actors Personalize Phishing Attacks With Advanced Tactics for Malware Delivery
  • Qilin Ransomware Leads The Attack Landscape With 70+ Claimed Victims in July
  • New FireWood Malware Attacking Linux Systems to Execute Commands and Exfiltrate Sensitive Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Threat Actors Attacking Windows Systems With New Multi-Stage Malware Framework PS1Bot
  • Cisco Secure Firewall Vulnerability Allows Hackers to Inject Remote Shell Command Injection
  • Threat Actors Personalize Phishing Attacks With Advanced Tactics for Malware Delivery
  • Qilin Ransomware Leads The Attack Landscape With 70+ Claimed Victims in July
  • New FireWood Malware Attacking Linux Systems to Execute Commands and Exfiltrate Sensitive Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News