Metrics
Affected Vendors & Products
Fri, 20 Mar 2026 22:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FMC) Software could allow an unauthenticated, remote attacker to execute arbitrary Java code as root on an affected device. This vulnerability is due to insecure deserialization of a user-supplied Java byte stream. An attacker could exploit this vulnerability by sending a crafted serialized Java object to the web-based management interface of an affected device. A successful exploit could allow the attacker to execute arbitrary code on the device and elevate privileges to root. Note: If the FMC management interface does not have public internet access, the attack surface that is associated with this vulnerability is reduced. | A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FMC) Software could allow an unauthenticated, remote attacker to execute arbitrary Java code as root on an affected device. This vulnerability is due to insecure deserialization of a user-supplied Java byte stream. An attacker could exploit this vulnerability by sending a crafted serialized Java object to the web-based management interface of an affected device. A successful exploit could allow the attacker to execute arbitrary code on the device and elevate privileges to root. Note: If the FMC management interface does not have public internet access, the attack surface that is associated with this vulnerability is reduced. |
Thu, 19 Mar 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:cisco:secure_firewall_management_center:10.0.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.13:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.14:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.15:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.16:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.17:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.18:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.0.0.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.0.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.0.1.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.0.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.0.2.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.0.2:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.0.3:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.0.4:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.0.5:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.0.6.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.0.6.2:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.0.6.3:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.0.6:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.0.7:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.0.8.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.0.8:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.2:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.3:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.2.0.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.2.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.2.10.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.2.10.2:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.2.10:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.2.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.2.2:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.2.3.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.2.3:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.2.4.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.2.4:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.2.5.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.2.5.2:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.2.5:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.2.6:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.2.7:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.2.8.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.2.8:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.2.9:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.3.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1.2:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.4.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.4.1.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.4.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.4.2.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.4.2.2:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.4.2.3:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.4.2.4:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.4.2:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.4.3:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.4.4:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.4.5:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.6.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.6.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.6.2.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.6.2:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.6.3:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.6.4:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.7.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.7.10.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.7.10:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.7.11:*:*:*:*:*:*:* |
Thu, 19 Mar 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
ssvc
|
ssvc
|
Thu, 19 Mar 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
kev
|
Thu, 19 Mar 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Thu, 05 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 05 Mar 2026 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Cisco
Cisco secure Firewall Management Center |
|
| Vendors & Products |
Cisco
Cisco secure Firewall Management Center |
Wed, 04 Mar 2026 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FMC) Software could allow an unauthenticated, remote attacker to execute arbitrary Java code as root on an affected device. This vulnerability is due to insecure deserialization of a user-supplied Java byte stream. An attacker could exploit this vulnerability by sending a crafted serialized Java object to the web-based management interface of an affected device. A successful exploit could allow the attacker to execute arbitrary code on the device and elevate privileges to root. Note: If the FMC management interface does not have public internet access, the attack surface that is associated with this vulnerability is reduced. | |
| Weaknesses | CWE-502 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: cisco
Published: 2026-03-04T17:17:56.008Z
Updated: 2026-03-20T21:45:26.916Z
Reserved: 2025-10-08T11:59:15.380Z
Link: CVE-2026-20131
Updated: 2026-03-05T14:06:12.803Z
Status : Modified
Published: 2026-03-04T18:16:27.153
Modified: 2026-03-20T22:16:26.120
Link: CVE-2026-20131
No data.
ReportizFlow