The flaw, tracked as CVE-2026-20131, carries a maximum CVSS score of 10.0, highlighting its severity and ease of exploitation.
According to Cisco, the vulnerability is already being targeted by threat actors in real-world attacks as of March 2026, making immediate patching essential for organizations using the affected platforms.
The issue is classified under CWE-502 (insecure deserialization) and exists in the web-based management interface of Cisco Secure FMC. The flaw arises from improper handling of user-supplied serialized Java objects.
An unauthenticated remote attacker can exploit this weakness by sending a specially crafted Java byte stream to the exposed management interface.
Because the attack does not require authentication or user interaction, it can be executed automatically over the network, significantly increasing its risk.
Once exploited, the attacker can execute arbitrary code on the underlying operating system with root-level privileges.
This effectively gives complete control over the compromised firewall management system, including visibility into network configurations, policies, and traffic flows.
The vulnerability impacts both:
All devices running vulnerable versions are affected, making the scope of this issue particularly broad.
However, Cisco confirmed that its Secure Firewall Adaptive Security Appliance (ASA) and Secure Firewall Threat Defense (FTD) software are not impacted by this flaw.
Security researchers warn that exposing the FMC management interface to the public internet significantly increases the risk of compromise.
In such scenarios, attackers can directly target the interface without needing internal network access.
Keane O’Kelley discovered the vulnerability from Cisco’s Advanced Security Initiatives Group during internal testing.
Despite responsible disclosure, attackers have already begun attempting exploitation in the wild.
A typical attack scenario could involve scanning for internet-exposed FMC interfaces, followed by delivering a malicious serialized payload to gain root access.
From there, attackers could manipulate firewall rules, disable protections, or pivot deeper into enterprise networks.
Cisco has stated that there are no workarounds or temporary mitigations available for this vulnerability. As a result, patching is the only effective defense.
For SaaS-based Cisco SCC Firewall Management users, fixes have already been applied automatically as part of Cisco’s maintenance updates, and no action is required.
However, organizations using on-premises FMC deployments must:
Even customers without active service contracts can obtain the necessary updates by contacting Cisco Technical Assistance Center (TAC).
Organizations are strongly advised to restrict access to FMC management interfaces and avoid exposing them to the public internet.
Placing management systems on isolated networks and enforcing strict access controls can reduce attack exposure.
Given active exploitation and the critical nature of this flaw, delayed patching could lead to full network compromise. Immediate action is essential to protect enterprise environments.
Follow us on Google News , LinkedIn and X to Get More Instant Updates. Set Cyberpress as a Preferred Source in Google
The post Cisco Secure Firewall Flaw Allows Remote Code Execution as Root appeared first on Cyber Security News.
On April 1, NASA's Artemis II is set to embark on its 10-day mission to…
On April 1, NASA's Artemis II is set to embark on its 10-day mission to…
Spider-Noir, the upcoming superhero series starring Nicolas Cage, debuts on MGM+ on May 25, 2026,…
Spider-Noir, the upcoming superhero series starring Nicolas Cage, debuts on MGM+ on May 25, 2026,…
INDIANAPOLIS, Ind. (WOWO) — As the countdown to the 2026 NCAA Men’s Final Four begins,…
WHITING, Ind. (WOWO) — Indiana Governor Mike Braun joined locked-out workers on the picket line…
This website uses cookies.