Redazione RHC : 15 August 2025 09:32
A critical security flaw has been disclosed by Cisco in its Secure Firewall Management Center (FMC) software, potentially allowing unauthenticated attackers to remotely execute shell commands of their choice with high levels of authorization. The vulnerability, identified as CVE-2025-20265 and assigned the maximum CVSS score of 10.0, represents one of the most serious security flaws discovered in Cisco’s firewall infrastructure this year.
Attackers can exploit this vulnerability by sending specially crafted credentials during the RADIUS authentication process, allowing them to inject malicious shell commands that are subsequently executed by the target device. What makes this vulnerability particularly dangerous is The fact that it requires no authentication and can be exploited remotely over the network.
Product | Affected Versions | Prerequisites | Status |
---|---|---|---|
Cisco Secure Firewall Management Center (FMC) Software | 7.0.7 | RADIUS Authentication Enabled | Vulnerable |
Cisco Secure Firewall Management Center (FMC) Software | 7.7.0 | RADIUS Authentication Enabled | Vulnerable |
Cisco Secure Firewall ASA Software | All Releases | N/A | Not Affected |
Cisco Secure Firewall Threat Defense (FTD) Software | All Releases | N/A | Not Affected |
The security vulnerability resides in the implementation of the RADIUS subsystem of Cisco’s Secure Firewall Software and specifically affects the authentication phase, where user input is improperly handled.
The vulnerability specifically affects Cisco Secure FMC Software versions 7.0.7 and 7.7.0, but only when RADIUS authentication is enabled for the web-based management interface, for SSH management, or for both. Organizations that do not use RADIUS authentication are not vulnerable to this specific attack vector.
The vulnerability results from insufficient input validation during the credential verification process, creating an opportunity for command injection attacks when the system processes authentication requests sent to the configured RADIUS server.
Cisco
has released updates and patches that address the vulnerability and strongly recommends applying the patches to all systems immediately. interested.