Description
A vulnerability in the CLI of Cisco Secure FTD Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system as root. To exploit this vulnerability, the attacker must have valid administrative credentials on an affected device.

This vulnerability is due to insufficient input validation of user-supplied command arguments. An attacker could exploit this vulnerability by submitting crafted input for a specific CLI command. A successful exploit could allow the attacker to execute commands on the underlying operating system as root.
Published: 2026-03-04
Score: 6 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Privilege Escalation via Authenticated Command Injection
Action: Apply Patch
AI Analysis

Impact

A flaw in the command‑line interface of Cisco Secure FTD Software allows an authenticated, local attacker to execute arbitrary commands on the underlying operating system as root. The vulnerability arises from insufficient validation of user‑supplied command arguments for a specific CLI command, making it a classic authenticated command injection that can be leveraged with valid administrative credentials. This is identified as CWE‑250, indicating elevation of privilege through improper input handling. Successful exploitation would give an attacker kernel‑level access, potentially compromising the device’s integrity, confidentiality, and availability.

Affected Systems

The affected product is Cisco Secure Firewall Threat Defense (FTD) Software. No specific version range is listed in the advisory, so all deployed instances of this software that have not yet applied the published fix are considered vulnerable.

Risk and Exploitability

The base CVSS score of 6.0 places the vulnerability in the moderate range, and the EPSS score of less than 1% indicates a very low exploitation probability, with little evidence of widespread attacks. Because the attacker must first possess valid administrative credentials—either locally or remotely—the probability of a public exploit is limited. However, inside a compromised environment or for insiders with administrative access, the impact is severe, enabling complete system takeover. The vulnerability is not listed in the CISA KEV catalog, indicating no known widespread exploitation to date.

Generated by OpenCVE AI on April 18, 2026 at 10:01 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Cisco Secure FTD Software patch or upgrade to a version that addresses the command injection flaw
  • Restrict administrative CLI access by enforcing the principle of least privilege and disabling the vulnerable command for non‑essential users
  • Enable logging and monitor for anomalous CLI activity to detect potential exploitation attempts

Generated by OpenCVE AI on April 18, 2026 at 10:01 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 05 Mar 2026 09:15:00 +0000

Type Values Removed Values Added
First Time appeared Cisco
Cisco secure Firewall Threat Defense
Vendors & Products Cisco
Cisco secure Firewall Threat Defense

Wed, 04 Mar 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 04 Mar 2026 18:00:00 +0000

Type Values Removed Values Added
Description A vulnerability in the CLI of Cisco Secure FTD Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system as root. To exploit this vulnerability, the attacker must have valid administrative credentials on an affected device. This vulnerability is due to insufficient input validation of user-supplied command arguments. An attacker could exploit this vulnerability by submitting crafted input for a specific CLI command. A successful exploit could allow the attacker to execute commands on the underlying operating system as&nbsp;root.
Title Cisco Secure FTD Software Authenticated Command Injection Vulnerability
Weaknesses CWE-250
References
Metrics cvssV3_1

{'score': 6, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N'}


Subscriptions

Cisco Secure Firewall Threat Defense
cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2026-03-05T04:55:53.018Z

Reserved: 2025-10-08T11:59:15.351Z

Link: CVE-2026-20017

cve-icon Vulnrichment

Updated: 2026-03-04T20:48:56.382Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-04T18:16:16.140

Modified: 2026-03-05T19:39:11.967

Link: CVE-2026-20017

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T10:15:25Z

Weaknesses