Description
A vulnerability in a small subset of CLI commands that are used on Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an authenticated, local attacker to craft Lua code that could be used on the underlying operating system as root.

This vulnerability exists because user-provided input is not properly sanitized. An attacker could exploit this vulnerability by crafting valid Lua code and submitting it as a malicious parameter for a CLI command. A successful exploit could allow the attacker to inject Lua code, which could lead to arbitrary code execution as the root user. To exploit this vulnerability, an attacker must have valid Administrator credentials.
Published: 2026-03-04
Score: 6 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Local authenticated arbitrary code execution as root
Action: Apply patch
AI Analysis

Impact

User input to certain CLI commands is unsanitized, allowing an authenticated local administrator to submit Lua code that the device will execute with root privileges. This class of vulnerability is a form of operating‑system code injection (CWE‑78). The attacker can use this to gain full control of the firewall, modify its configuration or exfiltrate data, effectively compromising confidentiality, integrity and availability of the protected network.

Affected Systems

Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software are affected. The description does not specify exact firmware or software versions; all releases that contain the identified CLI commands are potentially vulnerable.

Risk and Exploitability

The CVSS score is 6.0, indicating medium severity. EPSS is reported as less than 1 %, so it is unlikely that automated exploit tools will target this weakness. It has not been listed in the CISA KEV catalog. The vulnerability requires local administrative credentials; an attacker who already achieves authentication can exploit the flaw. Given the medium CVSS and low exploitation probability, the overall risk is moderate, but the ability to gain root access makes it a high value target for privileged insiders or attackers who initially compromise credentials.

Generated by OpenCVE AI on April 16, 2026 at 13:29 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the official Cisco firmware update that includes the Lua sanitization fix
  • Restrict access to the vulnerable CLI commands by limiting them to a trusted administrative role
  • Disable or remove Lua execution capability on the appliance if not required for operation
  • Restart the firewall after applying the update to ensure the new interpreter is loaded
  • Configure audit logging to monitor for unauthorized Lua code submissions

Generated by OpenCVE AI on April 16, 2026 at 13:29 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 16 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Cisco firepower Threat Defense Software
CPEs cpe:2.3:a:cisco:firepower_threat_defense_software:*:*:*:*:*:*:*:*
cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*
Vendors & Products Cisco firepower Threat Defense Software

Thu, 05 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 05 Mar 2026 09:15:00 +0000

Type Values Removed Values Added
First Time appeared Cisco
Cisco adaptive Security Appliance Software
Cisco secure Firewall Threat Defense
Vendors & Products Cisco
Cisco adaptive Security Appliance Software
Cisco secure Firewall Threat Defense

Wed, 04 Mar 2026 17:30:00 +0000

Type Values Removed Values Added
Description A vulnerability in a small subset of CLI commands that are used on Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an authenticated, local attacker to craft Lua code that could be used on the underlying operating system as&nbsp;root. This vulnerability exists because user-provided input is not properly sanitized. An attacker could exploit this vulnerability by crafting valid Lua code and submitting it as a malicious parameter for a CLI command. A successful exploit could allow the attacker to inject Lua code, which could lead to arbitrary code execution as the root user. To exploit this vulnerability, an attacker must have valid&nbsp;Administrator&nbsp;credentials.
Title Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software Lua Code Injection Vulnerability
Weaknesses CWE-78
References
Metrics cvssV3_1

{'score': 6, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N'}


Subscriptions

Cisco Adaptive Security Appliance Software Firepower Threat Defense Software Secure Firewall Threat Defense
cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2026-03-05T14:05:13.395Z

Reserved: 2025-10-08T11:59:15.349Z

Link: CVE-2026-20008

cve-icon Vulnrichment

Updated: 2026-03-05T14:05:09.816Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-04T18:16:14.383

Modified: 2026-04-16T20:13:21.140

Link: CVE-2026-20008

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T13:30:16Z

Weaknesses