CVE-2025-20265

10.0 CRITICAL

📋 TL;DR

This critical vulnerability in Cisco Secure Firewall Management Center allows unauthenticated remote attackers to execute arbitrary shell commands with high privileges by sending crafted input during RADIUS authentication. Only systems configured for RADIUS authentication for web or SSH management interfaces are affected. Attackers could gain complete control of the management system.

💻 Affected Systems

Products:
  • Cisco Secure Firewall Management Center (FMC)
Versions: All versions prior to 7.6.0
Operating Systems: Cisco FMC OS
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when configured for RADIUS authentication for web-based management interface or SSH management.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the firewall management system, allowing attackers to reconfigure firewalls, exfiltrate network data, pivot to internal networks, and disrupt security operations.

🟠

Likely Case

Remote code execution leading to installation of backdoors, credential theft, and lateral movement within the network.

🟢

If Mitigated

No impact if RADIUS authentication is not configured or if proper network segmentation isolates the management interface.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending crafted input during RADIUS authentication process. No authentication required.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.6.0 and later

Vendor Advisory: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-radius-rce-TNBKf79

Restart Required: Yes

Instructions:

1. Backup current configuration. 2. Download and install Cisco Secure FMC Software version 7.6.0 or later from Cisco Software Center. 3. Reboot the system after installation. 4. Verify the update was successful.

🔧 Temporary Workarounds

Disable RADIUS Authentication

all

Temporarily disable RADIUS authentication and use local authentication until patching is complete.

Network Segmentation

all

Restrict access to FMC management interfaces to trusted networks only using firewall rules.

🧯 If You Can't Patch

  • Disable RADIUS authentication immediately and switch to local authentication
  • Implement strict network access controls to limit FMC management interface exposure

🔍 How to Verify

Check if Vulnerable:

Check if RADIUS authentication is enabled in System > Users > Authentication and check FMC version is below 7.6.0

Check Version:

show version (via CLI) or check System > Updates in web interface

Verify Fix Applied:

Verify FMC version is 7.6.0 or higher via System > Updates > Installed Updates

📡 Detection & Monitoring

Log Indicators:

  • Unusual RADIUS authentication attempts
  • Failed authentication with unusual characters in username/password fields
  • Shell command execution in system logs

Network Indicators:

  • Unusual traffic to FMC RADIUS ports (1812/1813)
  • Multiple failed authentication attempts from single source

SIEM Query:

source="fmc" AND (event_type="authentication" AND (username CONTAINS special_characters OR status="failed"))

🔗 References

📤 Share & Export