Description
A vulnerability in the web-based management interface of Cisco Secure FMC Software could allow an authenticated, remote attacker to conduct SQL injection attacks on an affected system.

This vulnerability is due to inadequate validation of user-supplied input. An attacker could exploit this vulnerability by sending crafted requests to an affected device. A successful exploit could allow the attacker to obtain full access to the database and read certain files on the underlying operating system. To exploit this vulnerability, the attacker would need valid user credentials.
Published: 2026-03-04
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote SQL injection with potential full database and OS file disclosure
Action: Immediate Patch
AI Analysis

Impact

This vulnerability occurs in the web‑based interface of Cisco Secure FMC Software and allows an authenticated remote attacker to inject arbitrary SQL statements due to insufficient input validation. Successful exploitation grants the attacker total access to the FMC database and the capability to read certain files on the underlying operating system, thereby compromising data confidentiality and potentially allowing further system manipulation.

Affected Systems

Cisco Secure Firewall Management Center (FMC) is affected; the specific product version is not listed in the advisory, but any installed instance of the SOC should be considered at risk.

Risk and Exploitability

The flaw carries a CVSS score of 8.1, indicating a severe risk. The EPSS score is less than 1%, suggesting a low current exploitation probability, and the vulnerability is not yet listed in CISA’s KEV catalog. The attack vector is remote and requires that the attacker possess valid user credentials to the FMC web interface, which typically means access to an administrative or privileged account. Once authenticated, the attacker can send crafted requests that execute arbitrary SQL commands, potentially yielding full database compromise and OS file reads.

Generated by OpenCVE AI on April 16, 2026 at 13:27 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the most recent vendor patch or upgrade that eliminates the SQL injection flaw.
  • Limit the FMC web console to trusted internal networks and enforce strict firewall rules to block unauthorized external access.
  • Activate multi‑factor authentication for all users with administrative or privileged FMC accounts.
  • Perform regular vulnerability scanning of the FMC management interface to detect any remaining or new weaknesses.

Generated by OpenCVE AI on April 16, 2026 at 13:27 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 16 Apr 2026 13:45:00 +0000

Type Values Removed Values Added
Title SQL Injection in Cisco Secure FMC Web Interface Allowing Database and OS File Access

Thu, 05 Mar 2026 09:15:00 +0000

Type Values Removed Values Added
First Time appeared Cisco
Cisco secure Firewall Management Center
Vendors & Products Cisco
Cisco secure Firewall Management Center

Wed, 04 Mar 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 04 Mar 2026 17:30:00 +0000

Type Values Removed Values Added
Description A vulnerability in the web-based management interface of Cisco Secure FMC Software could allow an authenticated, remote attacker to conduct SQL injection attacks on an affected system. This vulnerability is due to inadequate validation of user-supplied input. An attacker could exploit this vulnerability by sending crafted requests to an affected device. A successful exploit could allow the attacker to obtain full access to the database and read certain files on the underlying operating system. To exploit this vulnerability, the attacker would need valid user credentials.
Weaknesses CWE-89
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}


Subscriptions

Cisco Secure Firewall Management Center
cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2026-03-05T04:55:44.497Z

Reserved: 2025-10-08T11:59:15.348Z

Link: CVE-2026-20002

cve-icon Vulnrichment

Updated: 2026-03-04T21:43:02.710Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-04T18:16:12.557

Modified: 2026-03-05T19:39:11.967

Link: CVE-2026-20002

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T13:30:16Z

Weaknesses