
ZDNET’s key takeaways
- Cisco’s Safe Firewall Administration Middle safety gap is as unhealthy as they get.
- There is no such thing as a mitigation and no workaround. Patch instantly.
- To this point, no confirmed energetic exploits have been confirmed.
Get extra in-depth ZDNET tech protection: Add us as a preferred Google source on Chrome and Chromium browsers.
Do you utilize Cisco’s Secure Firewall Management Center (FMC) software program? If your organization operates a critical community utilizing Cisco merchandise — and with Cisco’s 76%+ market share of high-end networking, chances are high that you simply do — you have to patch it. Not over the weekend. Not Monday. Proper now.
Additionally: Microsoft patches more than 100 Windows security flaws – update your PC now
Cisco has simply patched a critical command injection vulnerability (CVE-2025-20265) in FMC. How important is important? Let’s put it this fashion: It has a Widespread Vulnerability Scoring System (CVSS) rating of 10.0, which is the best doable threat score in vulnerability scoring. Particularly, the flaw impacts FMC variations 7.0.7 and seven.7.0 which have been configured for RADIUS authentication on the web-based or SSH administration interface.
RADIUS is the de facto commonplace for community authentication. It is the commonest implementation used to allow 802.1X entry management administration. In different phrases, when you use FMC, it is virtually a certainty you are utilizing RADIUS, which suggests you are weak.
The issue is that as a result of the software program did not sanitize consumer enter within the RADIUS authentication section, attackers can send crafted credentials that will be executed as high-privileged shell commands. If abused appropriately, this will grant anybody full management over the firewall administration heart.
Additionally: This infamous people search site is back after leaking 3 billion records – how to remove your data from it ASAP
Including insult to harm, attackers can exploit the flaw with none prior system entry or legitimate credentials. I repeat: with none prior system entry or legitimate credentials.
This can be a safety nightmare. As soon as a hacker has full management over firewall administration, they’ll do just about something they wish to each the firewall and the remainder of your community.
The one bit of fine information is that Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software are usually not affected.
Oh, and by the way in which, Cisco states, “There are not any workarounds that handle this vulnerability.” You will need to patch this system. Now.
Cisco reviews that there have been no confirmed energetic exploits within the wild thus far. Give it time. The knowledge within the safety report is greater than sufficient for a intelligent hacker to determine exploit this safety gap.
So, as soon as extra and with feeling, patch it. Patch it now.
Additionally: Don’t fall for AI-powered disinformation attacks online – here’s how to stay sharp
Cisco clients with service contracts that entitle them to common software program updates ought to receive safety fixes by their ordinary replace channels. Nevertheless, given how deep this gap goes, Cisco can be providing the patch free of charge. In both case, take the next steps:
-
Go to the official Cisco Security Advisory for CVE-2025-20265.
-
Log in along with your Cisco account linked to your group’s help contract.
-
Use the Cisco Software program Checker instrument or test the Obtain part of the advisory to establish the particular mounted launch in your equipment/model.
-
Obtain and set up the FMC software program replace in your deployment — patched variations for 7.0.7 and seven.7.0 are offered.
what to do now. Get on with it.





