Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20265: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') in Cisco Cisco Firepower Management Center

0
Critical
VulnerabilityCVE-2025-20265cvecve-2025-20265
Published: Thu Aug 14 2025 (08/14/2025, 16:30:03 UTC)
Source: CVE Database V5
Vendor/Project: Cisco
Product: Cisco Firepower Management Center

Description

A vulnerability in the RADIUS subsystem implementation of Cisco Secure Firewall Management Center (FMC) Software could allow an unauthenticated, remote attacker to inject arbitrary shell commands that are executed by the device.  This vulnerability is due to a lack of proper handling of user input during the authentication phase. An attacker could exploit this vulnerability by sending crafted input when entering credentials that will be authenticated at the configured RADIUS server. A successful exploit could allow the attacker to execute commands at a high privilege level. Note: For this vulnerability to be exploited, Cisco Secure FMC Software must be configured for RADIUS authentication for the web-based management interface, SSH management, or both.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 22:22:16 UTC

Technical Analysis

CVE-2025-20265 is a critical vulnerability identified in Cisco Secure Firewall Management Center (FMC) software versions 7.0.7 and 7.7.0. The flaw exists in the RADIUS subsystem implementation, specifically in how user input is handled during the authentication phase. The vulnerability stems from improper neutralization of special elements in the input, which allows an unauthenticated remote attacker to inject arbitrary shell commands. These commands are executed by the device with high privileges, potentially allowing full compromise of the FMC. The attack vector involves sending crafted input during the RADIUS authentication process, which is used by the FMC when configured to authenticate users via RADIUS for the web-based management interface or SSH management access. Because the vulnerability does not require prior authentication or user interaction, and the attack surface is exposed over the network, it poses a severe risk. The vulnerability has been assigned a CVSS 3.1 base score of 10.0, indicating critical impact on confidentiality, integrity, and availability, with network attack vector, no privileges required, and no user interaction needed. Although no public exploits have been reported yet, the critical nature and ease of exploitation make this a high-priority issue for affected organizations. Cisco has not yet published patches or mitigation details at the time of this report, increasing the urgency for defensive measures.

Potential Impact

The impact of CVE-2025-20265 is severe for organizations worldwide that deploy Cisco Firepower Management Center with RADIUS authentication enabled. Successful exploitation allows attackers to execute arbitrary commands with high privileges on the FMC device, potentially leading to full system compromise. This could result in unauthorized access to sensitive network management functions, manipulation or disruption of firewall policies, interception or alteration of network traffic, and lateral movement within the network. The compromise of FMC, a central security management platform, could undermine the entire security posture of an organization, affecting confidentiality, integrity, and availability of critical network infrastructure. Given the criticality and ease of exploitation, attackers could leverage this vulnerability to establish persistent footholds, deploy ransomware, or conduct espionage. The lack of authentication and user interaction requirements broadens the attack surface, making remote exploitation feasible from anywhere with network access to the FMC. Organizations in sectors with high security demands such as government, finance, healthcare, and critical infrastructure are particularly at risk, as compromise could have cascading effects on national security and public safety.

Mitigation Recommendations

To mitigate CVE-2025-20265, organizations should immediately assess whether Cisco Firepower Management Center instances are configured to use RADIUS authentication for web or SSH management interfaces. If so, restrict network access to these management interfaces using network segmentation, firewalls, and VPNs to limit exposure to trusted administrators only. Implement strict ingress filtering to block unauthorized traffic to the FMC management ports. Monitor logs and network traffic for unusual authentication attempts or command execution patterns indicative of exploitation attempts. Until official patches are released by Cisco, consider disabling RADIUS authentication on FMC management interfaces if operationally feasible, or switch to alternative authentication methods such as local accounts or TACACS+ that are not affected. Apply principle of least privilege to management accounts and enforce multi-factor authentication where possible. Regularly update and audit FMC software and configurations. Once Cisco releases patches or updates, prioritize their deployment in all affected environments. Additionally, conduct penetration testing and vulnerability scanning focused on FMC to detect potential exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
cisco
Date Reserved
2024-10-10T19:15:13.244Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 689e1338ad5a09ad005ce403

Added to database: 8/14/2025, 4:47:52 PM

Last enriched: 2/26/2026, 10:22:16 PM

Last updated: 3/25/2026, 5:40:12 AM

Views: 129

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses