[CIVN-2025-0185] Remote Code Execution Vulnerability in CISCO
—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
Remote Code Execution Vulnerability in CISCO
Indian – Computer Emergency Response Team (https://www.cert-in.org.in)
Severity Rating: CRITICAL
Software Affected
Cisco Secure FMC Software
Overview
A vulnerability has been reported in RADIUS subsystem implementation of Cisco Secure Firewall Management Center (FMC) Software could allow an unauthenticated, remote attacker to inject arbitrary shell commands that are executed by the device.
Target Audience:
All IT administrators and individuals responsible for maintaining and updating RADIUS subsystem implementation of Cisco Secure Firewall Management Center (FMC) Software.
Risk Assessment:
High risk of data manipulation and service disruption.
Impact Assessment:
Potential impact on confidentiality, integrity, and availability of the system.
Description
This vulnerability exists due to a lack of proper handling of user input during the authentication phase. An attacker could exploit this vulnerability by sending crafted input when entering credentials that will be authenticated at the configured RADIUS server.
Successful exploitation of this vulnerability could allow the attacker to execute commands at a high privilege level.
Note: For this vulnerability to be exploited, Cisco Secure FMC Software must be configured for RADIUS authentication for the web-based management interface, SSH management, or both.
Solution
Apply appropriate updates as mentioned in Cisco Advisory
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-radius-rce-TNBKf79
Vendor Information
CISCO
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-radius-rce-TNBKf79
References
CISCO
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-radius-rce-TNBKf79
CVE Name
CVE-2025-20265
– —
Thanks and Regards,
CERT-In
Incident Response Help Desk
e-mail: incident@cert-in.org.in
Phone: +91-11-22902657
Toll Free Number: 1800-11-4949
Toll Free Fax : 1800-11-6969
Web: http://www.cert-in.org.in
PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4
PGP Key information:
https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS
Postal address:
Indian Computer Emergency Response Team (CERT-In)
Ministry of Electronics and Information Technology
Government of India
Electronics Niketan
6, C.G.O. Complex
New Delhi-110 003
—–BEGIN PGP SIGNATURE—–
iQIzBAEBCAAdFiEE6r4Iam/Ey0c/KakL3jCgcSdcys8FAmipv+4ACgkQ3jCgcSdc
ys+iSw//fo6kUzaMyL2HWrpYaYeX62Ve0eju46PC/XgAFALte7Ad0+2Cb9OxTOsT
xp1EyrgZ86CvPP74oMGQRNteef0Pny0PFgCEirclQ1c8OI/idCJCRrkNuJ7ysTdi
9zFjBRHkSH4p9wWVM3uFfnadpu2y0vqwIMnYbUzI2bRNi9xzgTP2QUAqRdqGEWuR
e4U7N7vqB1udN6H95ynZvjKf+ubpzwM58jzi3FMXYhIC/Eb3jyofpjfOOFzz8QyO
4Q344tXL0vJHL1sJrxlNdPCfgF8N/nkBw6wvhYHgjNbadTWZIbekCPmkgFU1Lo5V
cRwDKPthOCQgCZnrKh4MoWmnqHP55j5RZdcMbgzgIDtwxm04+/I/mMzOH4uYdIsf
MJet7GZ917GAgHX3kkggj5ea8aMCwS7121d+Ps9FaQMcyAt88QdNICcwOnFSA2Tu
/LnxFjba4ZdF/ZQK19R252amFjSosUQE3MLwMD9RctmuiXidAkbL3rscwet0Qis4
dcG0RNvN5fJR3LXOoa2g0apTVmPfZ0IFIvidja3C9wyTrge/p5v+SdPmaCnlsPtd
k3pk1BwA/CaZKQc956R4qc74vLHSzOrXvbdK91qOZOXHfhnHYNoF0W0NaooQYrPf
anXWz8MGGSA8hfnx8cKJJPFtaAvS++ZjoaRldpjfYTimLyhlyo0=
=7twY
—–END PGP SIGNATURE—–