Description
A vulnerability in the lockdown mechanism of Cisco Secure Firewall Management Center (FMC) Software could allow an authenticated, local attacker to perform arbitrary commands as root.

This vulnerability is due to insufficient restrictions on remediation modules while in lockdown mode. An attacker could exploit this vulnerability by sending crafted input to the system CLI of the affected device. A successful exploit could allow the attacker to run arbitrary commands or code as root, even when the system is in lockdown mode. To exploit this vulnerability, the attacker must have valid administrative credentials.
Published: 2026-03-04
Score: 6 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Local Command Injection Leading to Privilege Escalation
Action: Patch Immediately
AI Analysis

Impact

Based on the description, a flaw in the lockdown enforcement of Cisco Secure Firewall Management Center permits an authenticated local attacker with administrative rights to inject arbitrary commands via the system CLI, potentially executing code as root even while the firewall is in lockdown mode. This locally privileged command injection can compromise the entire device, allowing attackers to modify configuration, exfiltrate data, or pivot further within the network.

Affected Systems

Based on the advisory, the vulnerability affects all Cisco Secure Firewall Management Center (FMC) deployments. Since specific affected versions are not listed, all released FMC software should be considered at risk until a patch is applied.

Risk and Exploitability

The CVSS score of 6.0 denotes moderate severity, while the EPSS of less than 1 percent indicates a low likelihood of widespread exploitation at this time. Based on the description, the attacker must have valid administrative credentials and can run commands as root, which would have severe impact. The vulnerability is not listed in the CISA KEV catalog. Based on its local privilege escalation capability, it is inferred that organizations should treat it as high‑priority.

Generated by OpenCVE AI on April 17, 2026 at 13:08 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to the latest Cisco Secure Firewall Management Center firmware that addresses the command injection flaw, as outlined in the Cisco security advisory.
  • Restrict local administrative privileges by disabling or minimizing privileged accounts, and enforce the principle of least privilege for users who can access the FMC CLI.
  • Enable network segmentation and monitor FMC logs for abnormal command execution patterns or unauthorized access attempts.

Generated by OpenCVE AI on April 17, 2026 at 13:08 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 05 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 05 Mar 2026 09:15:00 +0000

Type Values Removed Values Added
First Time appeared Cisco
Cisco secure Firewall Management Center
Vendors & Products Cisco
Cisco secure Firewall Management Center

Wed, 04 Mar 2026 17:30:00 +0000

Type Values Removed Values Added
Description A vulnerability in the lockdown mechanism of Cisco Secure Firewall Management Center (FMC) Software could allow an authenticated, local attacker to perform arbitrary commands as root. This vulnerability is due to insufficient restrictions on remediation modules while in lockdown mode. An attacker could exploit this vulnerability by sending crafted input to the system CLI of the affected device. A successful exploit could allow the attacker to run arbitrary commands or code as root, even when the system is in lockdown mode. To exploit this vulnerability, the attacker must have valid administrative credentials.
Title Cisco Secure Firewall Management Center Command Injection Vulnerability
Weaknesses CWE-269
References
Metrics cvssV3_1

{'score': 6, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N'}


Subscriptions

Cisco Secure Firewall Management Center
cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2026-03-05T14:05:46.010Z

Reserved: 2025-10-08T11:59:15.354Z

Link: CVE-2026-20044

cve-icon Vulnrichment

Updated: 2026-03-05T14:05:43.244Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-04T18:16:17.580

Modified: 2026-03-05T19:39:11.967

Link: CVE-2026-20044

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T13:15:19Z

Weaknesses