Home Cisco CVE-2026-20079
Back to Cisco

CVE-2026-20079

Secure Firewall Management Center (FMC) Software

Cisco CVSS 10 Updated March 16, 2026

Executive Risk Summary

"A vulnerability in the web interface of Cisco Secure Firewall Management Center (FMC) Software could allow an unauthenticated, remote attacker to bypass authentication and execute script files on an affected device to obtain root access to the underlying operating system. This vulnerability is due to an improper system process that is created at boot time and can be exploited by sending crafted HTTP requests to an affected device."

Operational Audit Arsenal

Target Type Firmware
Target Asset Cisco Secure Firewall Management Center (FMC) Software
Standard Path Firmware Image

Manual Verification Required

This is a non-Windows asset (Cisco). Use the target asset details above to verify your version against vendor advisories.

Patch Impact Forecast

Reboot Required Likely

Potential network disruption during reboot

Internal Work Notes

CVE-2026-20079: Unauthenticated remote attacker can bypass authentication and gain root access to Cisco FMC, exploit via crafted HTTP requests, patch and reboot required

Intelligence Sources

Related Cisco Threats

Scope of Impact

Original NVD Description

"A vulnerability in the web interface of Cisco Secure Firewall Management Center (FMC) Software could allow an unauthenticated, remote attacker to bypass authentication and execute script files on an affected device to obtain root access to the underlying operating system. This vulnerability is due to an improper system process that is created at boot time. An attacker could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute a variety of scripts and commands that allow root access to the device."

Data compiled from NVD, MSRC, and CISA KEV Catalog. Intelligence synthesized via AI. Scripts provided for diagnostic purposes under MIT License.