Cisco Secure Firewall Management Center RADIUS Remote Code Execution

CRITICAL (10.0) No Patch (122 days)

Threat Intelligence

⚠️ CRITICAL GAP - Exploits exist but no detection available
EPSS Score: 0.24% chance of exploitation (percentile: 47%)
🔍 Detection Tools: None available in major open-source tools
⚔️ Exploit Availability: GitHub PoC

How we test →

What is it?

The Cisco Secure Firewall Management Center Software is a network security solution used to manage and monitor firewall configurations. This vulnerability allows an unauthenticated, remote attacker to inject arbitrary shell commands that are executed by the device, potentially leading to unauthorized access and data breaches.

Am I affected?

You're affected if you use A vulnerability. Specific version info not stated in the advisory. If you don't recognise this software, you're probably not affected.

Affected Products

Cisco Systems / Secure Firewall Management Center

How to fix

Upgrade to Cisco Secure FMC Software version 3.4.x or later.
- For immediate mitigations:
- Restrict network access to your Cisco Secure FMC instance (firewall it from the public internet)
- Audit admin account activity for suspicious access patterns
- Monitor for unauthorized token creation