CVE-2026-20044Improper Privilege Management in Cisco Secure Firewall Management Center

Severity
6.0MEDIUMNVD
EPSS
0.0%
top 96.50%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 4

Description

A vulnerability in the lockdown mechanism of Cisco Secure Firewall Management Center (FMC) Software could allow an authenticated, local attacker to perform arbitrary commands as root. This vulnerability is due to insufficient restrictions on remediation modules while in lockdown mode. An attacker could exploit this vulnerability by sending crafted input to the system CLI of the affected device. A successful exploit could allow the attacker to run arbitrary commands or code as root, even when th

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:NExploitability: 0.8 | Impact: 5.2

Affected Packages1 packages

🔴Vulnerability Details

2
GHSA
GHSA-924w-xj2p-25w9: A vulnerability in the lockdown mechanism of Cisco Secure Firewall Management Center (FMC) Software could allow an authenticated, local attacker to pe2026-03-04
CVEList
Cisco Secure Firewall Management Center Command Injection Vulnerability2026-03-04

📋Vendor Advisories

1
Cisco
Cisco Secure Firewall Management Center Software Command Injection Vulnerability2026-03-04
CVE-2026-20044 — Improper Privilege Management in Cisco | cvebase