Cisco Patches Two Max Severity Secure FMC Flaws Enabling Root Access

Cisco has released critical security updates to address two maximum-severity vulnerabilities in its Secure Firewall Management Center (FMC) software that could allow unauthenticated remote attackers to gain complete root access to affected systems.

Critical Vulnerabilities Overview

Secure FMC serves as the central management interface for Cisco firewall administrators, providing control over application policies, intrusion prevention, URL filtering, and advanced malware protection. The newly patched vulnerabilities pose severe risks to enterprise security infrastructure.

CVE-2026-20079: Authentication Bypass to Root Access

This vulnerability allows attackers to bypass authentication mechanisms entirely and gain root access to the underlying operating system. According to Cisco’s advisory:

“An attacker could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute a variety of scripts and commands that allow root access to the device.”

CVE-2026-20131: Remote Code Execution via Java Deserialization

The second vulnerability enables attackers to execute arbitrary Java code as root on unpatched devices through a classic deserialization attack vector. Cisco explained:

“An attacker could exploit this vulnerability by sending a crafted serialized Java object to the web-based management interface of an affected device. A successful exploit could allow the attacker to execute arbitrary code on the device and elevate privileges to root.”

Extended Attack Surface: Cloud Control Also Affected

While both vulnerabilities affect Cisco Secure FMC Software, CVE-2026-20131 also impacts Cisco Security Cloud Control (SCC) Firewall Management — a cloud-based security policy manager used to simplify policy deployment across Cisco firewalls and other devices.

No Active Exploitation Detected — Yet

Cisco’s Product Security Incident Response Team (PSIRT) reports no evidence of active exploitation or public proof-of-concept (PoC) exploit code at this time. However, given the maximum severity ratings and the strategic value of firewall management systems, organizations should prioritize patching immediately.

Additional Patches Released

Alongside these critical fixes, Cisco has also addressed dozens of other security vulnerabilities, including 15 high-severity flaws affecting:

  • Secure FMC
  • Secure Firewall Adaptive Security Appliance (ASA)
  • Secure Firewall Threat Defense software

Why This Matters

This disclosure follows a pattern of critical Cisco security patches in recent months:

  • August 2025: Another max-severity FMC flaw allowing shell command injection
  • January 2026: AsyncOS zero-day exploited since November 2025
  • January 2026: Critical Unified Communications RCE zero-day
  • February 2026: Catalyst SD-WAN authentication bypass exploited since 2023

Organizations running Cisco Secure FMC should apply patches immediately and audit their environments for any signs of compromise.

Source: BleepingComputer