
ZDNET’s key takeaways
- Cisco’s Safe Firewall Administration Middle safety gap is as unhealthy as they get.
- There is no such thing as a mitigation and no workaround. Patch instantly.
- Thus far, no confirmed lively exploits have been confirmed.
Get extra in-depth ZDNET tech protection: Add us as a preferred Google source on Chrome and Chromium browsers.
Do you utilize Cisco’s Secure Firewall Management Center (FMC) software program? If your organization operates a severe community utilizing Cisco merchandise — and with Cisco’s 76%+ market share of high-end networking, likelihood is that you just do — you have to patch it. Not over the weekend. Not Monday. Proper now.
Additionally: Microsoft patches more than 100 Windows security flaws – update your PC now
Cisco has simply patched a critical command injection vulnerability (CVE-2025-20265) in FMC. How essential is essential? Let’s put it this fashion: It has a Widespread Vulnerability Scoring System (CVSS) rating of 10.0, which is the very best attainable danger ranking in vulnerability scoring. Particularly, the flaw impacts FMC variations 7.0.7 and seven.7.0 which have been configured for RADIUS authentication on the web-based or SSH administration interface.
RADIUS is the de facto normal for community authentication. It is the commonest implementation used to allow 802.1X entry management administration. In different phrases, in the event you use FMC, it is nearly a certainty you are utilizing RADIUS, which implies you are weak.
The issue is that as a result of the software program did not sanitize person enter within the RADIUS authentication section, attackers can send crafted credentials that will be executed as high-privileged shell commands. If abused accurately, this could grant anybody full management over the firewall administration middle.
Additionally: This infamous people search site is back after leaking 3 billion records – how to remove your data from it ASAP
Including insult to damage, attackers can exploit the flaw with none prior system entry or legitimate credentials. I repeat: with none prior system entry or legitimate credentials.
It is a safety nightmare. As soon as a hacker has full management over firewall administration, they’ll do just about something they wish to each the firewall and the remainder of your community.
The one bit of excellent information is that Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software should not affected.
Oh, and by the way in which, Cisco states, “There are not any workarounds that deal with this vulnerability.” You could patch this system. Now.
Cisco experiences that there have been no confirmed lively exploits within the wild to date. Give it time. The knowledge within the safety report is greater than sufficient for a intelligent hacker to determine exploit this safety gap.
So, as soon as extra and with feeling, patch it. Patch it now.
Additionally: Don’t fall for AI-powered disinformation attacks online – here’s how to stay sharp
Cisco clients with service contracts that entitle them to common software program updates ought to acquire safety fixes by means of their traditional replace channels. Nevertheless, given how deep this gap goes, Cisco can also be providing the patch totally free. In both case, take the next steps:
Go to the official Cisco Security Advisory for CVE-2025-20265.
Log in together with your Cisco account linked to your group’s assist contract.
Use the Cisco Software program Checker software or verify the Obtain part of the advisory to determine the precise fastened launch in your equipment/model.
Obtain and set up the FMC software program replace in your deployment — patched variations for 7.0.7 and seven.7.0 are offered.
You recognize what to do now. Get on with it.