RADIUS Authentication Vulnerability in Cisco Secure Firewall Management Center Software
CVE-2025-20265

10CRITICAL

Key Information:

Vendor

Cisco

Vendor
CVE Published:
14 August 2025

Badges

๐Ÿ”ฅ Trending now๐Ÿ“ˆ Trended๐Ÿ“ˆ Score: 1,990๐Ÿ‘พ Exploit Exists

What is CVE-2025-20265?

CVE-2025-20265 is a critical vulnerability found in the RADIUS authentication subsystem of Cisco Secure Firewall Management Center (FMC) Software. Cisco's FMC is designed to facilitate the management of security policies and device configurations for firewall devices. This vulnerability arises from insufficient input validation during the authentication phase, which allows an unauthenticated remote attacker to inject arbitrary shell commands into the system. If successfully exploited, this could enable the attacker to execute commands with high privileges, compromising the integrity and security of the affected devices. This vulnerability particularly affects organizations utilizing RADIUS for web-based management interfaces or SSH management, increasing their exposure to remote attacks.

Potential impact of CVE-2025-20265

  1. Unauthorized Command Execution: The most critical impact of this vulnerability is the potential for unauthorized execution of arbitrary commands. Attackers can manipulate the authentication process to gain elevated privileges, allowing them to perform various malicious activities, such as altering configurations or accessing sensitive data.

  2. System Compromise: Successful exploitation of this vulnerability could lead to the complete compromise of the Cisco Secure Firewall Management Center. Attackers could potentially take control of the management interface, affecting not only the security policies of the organization but also the security of all connected network devices.

  3. Increased Risk of Data Breaches: With high-level access granted through this vulnerability, attackers can exfiltrate sensitive information and breach user privacy. Such breaches could have severe consequences for organizations, including financial loss, reputational damage, and regulatory penalties.

Affected Version(s)

Cisco Firepower Management Center 7.0.7

Cisco Firepower Management Center 7.7.0

References

CVSS V3.1

Score:
10
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Changed

Timeline

  • ๐Ÿ“ˆ

    Vulnerability started trending

  • ๐Ÿ‘พ

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2025-20265 : RADIUS Authentication Vulnerability in Cisco Secure Firewall Management Center Software