[CIVN-2026-0119] SQL Injection Vulnerability in CISCO

By Published On: March 10, 2026

—–BEGIN PGP SIGNED MESSAGE—–

Hash: SHA256


SQL Injection Vulnerability in CISCO  


Indian – Computer Emergency Response Team (https://www.cert-in.org.in)


Severity Rating: HIGH


Software Affected


FMC Software

Overview


Multiple vulnerabilities have been reported in the web-based management interface and REST API of Cisco Secure Firewall Management Center (FMC) Software could allow an authenticated, remote attacker to conduct SQL injection attacks on an affected system.


Target Audience: 

All IT administrators and individuals responsible for maintaining and updating in Software.


Risk Assessment:

High risk of data manipulation and service disruption.


Impact Assessment:

Potential impact on confidentiality, integrity, and availability of the system.


Description


Multiple vulnerabilities exist in FMC Software due to inadequate validation of user-supplied input. An attacker could exploit this vulnerability by sending crafted requests to an affected device.


Successful exploitation of these vulnerabilities could allow the attacker to obtain full access to the database and read certain files on the underlying operating system.


Solution


Apply appropriate updates as mentioned in Cisco Advisory

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-sql-injection-2qH6CcJd



Vendor Information


CISCO

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-sql-injection-2qH6CcJd


References


CISCO

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-sql-injection-2qH6CcJd


CVE Name

CVE-2026-20001

CVE-2026-20002

CVE-2026-20003




– —


Thanks and Regards,

CERT-In


Incident Response Help Desk

e-mail: incident@cert-in.org.in

Phone: +91-11-22902657

Toll Free Number: 1800-11-4949

Toll Free Fax : 1800-11-6969

Web: http://www.cert-in.org.in

PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4

PGP Key information:

https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS


Postal address:

Indian Computer Emergency Response Team (CERT-In)

Ministry of Electronics and Information Technology

Government of India

Electronics Niketan

6, C.G.O. Complex

New Delhi-110 003

—–BEGIN PGP SIGNATURE—–


iQIzBAEBCAAdFiEE6r4Iam/Ey0c/KakL3jCgcSdcys8FAmmwFN0ACgkQ3jCgcSdc

ys+0Ag//UN7qCXCGQczGirc3Za6zLzCIZIU+iJKvBIWXQr/EETrUV2NLhAWAdI6B

HN+j9eDtlCcRD1FE5hHihtn5/JydK5pPNFe+CKj0WZXICdkV+r5dmpWR8zOCUZI8

OPHTQVeu85sxQ6BqvPNjMw+Yy4XeCUy8h6qH9b0gotKvNFS7ptQXVj5D1BXFObUD

f2aJb6NnbdGoJJVtEmjXFYHrJlg+zhJd0AWjpKuOpQgRysK+VweaT7XJTAHg6sjO

Sm/QEIaZLQD+rwyrSREmrsqNm3h9cWX0IVNCkNbNBTTYxazok7GNpiakq5SPZfgf

WVyIqe8Xagv+67vt5SdwfsU0dPLOZIE0u5aGAAnmM2jA24V4DS3o4XWtPhYqaue/

iCv1hqsZXbmGWDXg2hYwJSGKBYvUh7oGNXLc/ujMa5kkyezNloQ+LQjfgLiNmH3J

4M6DPw1ZoZiOuDGUpuqoOGIEeZH52WqkS2HGcAAtkAwY7YvuGTuWm5TZwkqmwhi8

JphaImLARuPIplRhuw/DXEzf/E1bCCkxeQR+Q8ZXFKvnOp5MWdZfTjAFhD5OSy3B

YKnOOysT2j2IjqkAzoXPT9v8kbVKrfUUy5ivORdXxVS7F92tMfJ5EXdYgF28LB3W

pK0IVLcKkWlxjiX+rOPwy/r+lf4fPz/WR1KNuAm3oa7Ew9CC468=

=nxXK

—–END PGP SIGNATURE—–

Share this article