Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).
CVE-2026-20079 — Authentication Bypass Using an Alternate Path or Channel in Cisco Secure Firewall Management Center
Severity
10.0CRITICALNVD
EPSS
11.1%
top 6.53%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedMar 4
Latest updateMar 5
Description
A vulnerability in the web interface of Cisco Secure Firewall Management Center (FMC) Software could allow an unauthenticated, remote attacker to bypass authentication and execute script files on an affected device to obtain root access to the underlying operating system.
This vulnerability is due to an improper system process that is created at boot time. An attacker could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow the att…
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:HExploitability: 3.9 | Impact: 6.0
Affected Packages1 packages
🔴Vulnerability Details
2GHSA▶
GHSA-mv8w-c2qv-cgrg: A vulnerability in the web interface of Cisco Secure Firewall Management Center (FMC) Software could allow an unauthenticated, remote attacker to bypa↗2026-03-04
CVEList▶
CVE-2026-20079: A vulnerability in the web interface of Cisco Secure Firewall Management Center (FMC) Software could allow an unauthenticated, remote attacker to bypa↗2026-03-04
💥Exploits & PoCs
1Nuclei▶
Cisco Secure Firewall Management Center - Authentication Bypass
📋Vendor Advisories
1Cisco
▶