Unrated severityNVD Advisory· Published Mar 4, 2026· Updated Mar 5, 2026
Cisco Secure Firewall Management Center Command Injection Vulnerability
CVE-2026-20044
Description
A vulnerability in the lockdown mechanism of Cisco Secure Firewall Management Center (FMC) Software could allow an authenticated, local attacker to perform arbitrary commands as root.
This vulnerability is due to insufficient restrictions on remediation modules while in lockdown mode. An attacker could exploit this vulnerability by sending crafted input to the system CLI of the affected device. A successful exploit could allow the attacker to run arbitrary commands or code as root, even when the system is in lockdown mode. To exploit this vulnerability, the attacker must have valid administrative credentials.
Affected products
2- Cisco/Cisco Secure Firewall Management Center (FMC)v5Range: 6.4.0.6
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.