Cisco Secure Firewall Management Center Software Remote Code Execution Vulnerability
A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FMC) allows an unauthenticated, remote attacker to execute arbitrary Java code with root privileges on the appliance. The vulnerability exists due to insecure deserialization of a user-supplied Java byte stream. An attacker could send a crafted serialized Java object to the FMC management interface and achieve remote code execution. Cisco has released software updates to address this vulnerability. If the FMC management interface does not have public internet access, the attack surface is reduced.
- Network access to the FMC management interface (web port, typically 443)
- No valid credentials required
- FMC management interface reachable from the attacker's network (internet or internal)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/81f5a9f7-ec6b-4d5b-8228-3583a10f34b5Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.