[CIVN-2026-0118] Multiple Vulnerabilities in CISCO

By Published On: March 10, 2026

—–BEGIN PGP SIGNED MESSAGE—–

Hash: SHA256


Multiple Vulnerabilities in CISCO


Indian – Computer Emergency Response Team (https://www.cert-in.org.in)


Severity Rating: CRITICAL


Systems Affected


FMC Software

Cisco Security Cloud Control (SCC) Firewall Management

Overview


Multiple vulnerabilities have been reported in the web-based management interface of Cisco Secure Firewall Management Center (FMC) Software could allow an  unauthenticated, remote attacker to execute arbitrary Java code as root on an affected device and bypass authentication and execute script files on an affected device to obtain root access to the underlying operating system.


Target Audience: 

All IT administrators and individuals responsible for maintaining and updating in Software.


Risk Assessment:

High risk of data manipulation and service disruption.


Impact Assessment:

Potential impact on confidentiality, integrity, and availability of the system.


Description


1. Remote Code Execution Vulnerability  ( CVE-2026-20131   )


This vulnerability exists due to insecure deserialization of a user-supplied Java byte stream. An attacker could exploit this vulnerability by sending a crafted serialized Java object to the web-based management interface of an affected device.

Successful exploitation of this vulnerability could allow the attacker to execute arbitrary code on the device and elevate privileges to root.


2. Authentication Bypass Vulnerability ( CVE-2026-20079   )


This vulnerability exists due to improper system process that is created at boot time. An attacker could exploit this vulnerability by sending crafted HTTP requests to an affected device.

Successful exploitation of this vulnerability could allow the attacker to execute a variety of scripts and commands that allow root access to the device.


Solution


Apply appropriate updates as mentioned in Cisco Advisory

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-rce-NKhnULJh


https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-onprem-fmc-authbypass-5JPp45V2



Vendor Information


CISCO

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-rce-NKhnULJh

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-onprem-fmc-authbypass-5JPp45V2


References


CISCO

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-rce-NKhnULJh

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-onprem-fmc-authbypass-5JPp45V2


CVE Name

CVE-2026-20131

CVE-2026-20079




– —


Thanks and Regards,

CERT-In


Incident Response Help Desk

e-mail: incident@cert-in.org.in

Phone: +91-11-22902657

Toll Free Number: 1800-11-4949

Toll Free Fax : 1800-11-6969

Web: http://www.cert-in.org.in

PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4

PGP Key information:

https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS


Postal address:

Indian Computer Emergency Response Team (CERT-In)

Ministry of Electronics and Information Technology

Government of India

Electronics Niketan

6, C.G.O. Complex

New Delhi-110 003

—–BEGIN PGP SIGNATURE—–


iQIzBAEBCAAdFiEE6r4Iam/Ey0c/KakL3jCgcSdcys8FAmmwFEUACgkQ3jCgcSdc

ys80fhAAmwzEge6Kzd9CF5NX2i4Ogi5OnZ5k/2ffb5HE8GjN109F9EBOgU9OHljX

+stQFyngLw6SkVDuHW0FloXqXW5f+SO20KPnrNs2olhBRfuIcFC7nGft5LobqmQA

qNmG9Lg4cHMfImHc+Myz8VBYnvbjdy/F+mpvn89hGXO6zUZaUuExafQqkm9ZPI/W

O7/6XUAwksT9WTIE2zdkEtQtMJS/7erB0NPTqOLnBOevcX37ZY7pgO698YPBFuV1

rePh6VpNGRAVD4halvil05YDqtTY+ZTIDqLInOb50XJGx8Upan2cy3v4tRa7Ygda

/6v2GFdOtnrmnMoAahaJCMWwX47utAPeRIRKQa9LdO+KkHFtlkPMzLU6c1j6GfAx

eims5+HI+CnhqCHyu3QB7rrRcFLueL0YweBZizNNCyQPGmCyfHO9m4HI8y/5oZQk

yC+EG4enUg2NKMiU59qT86V/+51nwHPpsqhTHfRHHx0QDLoGr99Nn2cEk0qFOg5u

Z9yj3YLChHmRoNtECc3FfLebyYME7xGuo6P++Qs32HWZrrZDMXgJTTQ8Bk9v9OiB

jJEsBHBsVuCAeMBpVDEWcU9SWZb47qM6scBxwCGjLig+XpRI7RAHCXNhtPwruTQb

K3IAtxc2NmpLPP4d1mCDYi9puEXyn1jHjV5KYXCNOBNRQ5rvHiQ=

=GTEt

—–END PGP SIGNATURE—–

Share this article