Cisco Patches Crucial Vulnerabilities in Enterprise Networking Merchandise – Cyber Tech
Cisco on Wednesday introduced fixes for 50 vulnerabilities throughout its merchandise, together with 48 affecting Firewall ASA, Safe FMC, and Safe FTD home equipment.
Cisco launched a March 2026 bundled publication containing 25 safety advisories that describe the safety defects affecting its enterprise networking merchandise, together with two advisories detailing critical-severity flaws.
The primary of them, tracked as CVE-2026-20079 (CVSS rating of 10/10), is described as an authentication bypass within the internet interface of Cisco Safe FMC software program.
Profitable exploitation of the bug permits attackers to execute arbitrary scripts on weak deployments and acquire root entry to the underlying OS.
“This vulnerability is because of an improper system course of that’s created at boot time. An attacker might exploit this vulnerability by sending crafted HTTP requests to an affected machine. A profitable exploit might enable the attacker to execute quite a lot of scripts and instructions that enable root entry to the machine,” Cisco explains.
The online interface of Safe FMC can also be impacted by CVE-2026-20131 (CVSS rating of 10/10), a important difficulty that might enable attackers to execute Java code with root privileges.
The weak spot exists as a result of a user-supplied Java byte stream is insecurely deserialized, permitting attackers to ship crafted serialized objects to set off the exploitation.
“A profitable exploit might enable the attacker to execute arbitrary code on the machine and elevate privileges to root,” Cisco explains, noting that the exploitation threat is decrease for FMC administration interfaces that aren’t accessible from the web.
On Wednesday, Cisco additionally introduced fixes for 9 high-severity vulnerabilities within the ASA Firewall, Safe FMC, and Safe FTD home equipment, which might be exploited to conduct SQL injection assaults, trigger denial-of-service (DoS) circumstances, and skim, create, or overwrite delicate information.
The remaining three dozen flaws addressed in Cisco’s enterprise networking home equipment are medium-severity points.
Cisco additionally introduced patches for medium-severity safety defects in Webex and ClamAV. Further data could be discovered on Cisco’s safety advisories web page.
Cisco says it isn’t conscious of any of those vulnerabilities being exploited within the wild. Customers are suggested to replace their deployments as quickly as doable.
Associated: Cisco Patches Catalyst SD-WAN Zero-Day Exploited by Extremely Refined Hackers
Associated: Cisco, F5 Patch Excessive-Severity Vulnerabilities
Associated: Hackers Focusing on Cisco Unified CM Zero-Day
Associated: Cisco Patches Vulnerability Exploited by Chinese language Hackers
