Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

VC Marcia Butcher, an associate of Epstein and founder of Day One, explains it herself.

Google sends student journalists’ personal and financial information to ICE

Almost half of xAI’s founding team has now left the company.

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Cisco warns CVSS 10.0 FMC radius defects and allows remote code execution
Identity

Cisco warns CVSS 10.0 FMC radius defects and allows remote code execution

userBy userAugust 15, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

August 15th, 2025Ravi LakshmananVulnerability/Network Security

Cisco has released a security update to address the biggest security flaws in the Secure Firewall Management Center (FMC) software, which allows attackers to run arbitrary code on affected systems.

A vulnerability assigned the CVE Identifier CVE-2025-20265 (CVSS score: 10.0) affects the implementation of the RADIUS subsystem that allows uncertified remote attackers to inject any shell commands executed by the device.

The Networking Equipment Major said the issue was due to the lack of proper handling of user input during the authentication phase. As a result, an attacker can send specially created input when entering credentials that are authenticated with the configured RADIUS server.

“A successful exploit allows an attacker to execute commands at a high level of privilege,” the company said in its recommendation on Thursday. “To exploit this vulnerability, Cisco Secure FMC software must be configured for RADIUS authentication with a web-based management interface, SSH management, or both.”

The downside is that if the Cisco Secure FMC software has RADIUS authentication enabled, it releases 7.0.7 and 7.7.0. There is no other workaround than applying the patches provided by the company. Cisco’s Brandon Sakai is believed to have discovered the issue during internal security testing.

Cybersecurity

In addition to CVE-2025-20265, Cisco has also solved many high-end bugs –

CVE-2025-20217 (CVSS Score: 8.6) – Cisco Secure Firewall Threat Defense Software 3 Service Negative Vulnerability CVE-2025-20222 (CVSS Score: 8.6) – Cisco Secure Firwall Adaptive Security Appliances and Secure Firewall Threat Defense Software CVE-2025-20224, CVE-2025-20225, CVE-2025-20239 (CVSS Score: 8.6) – Cisco iOS, iOS XE, Secure Firewall Adaptive Security Appliance, Secure Firewall Threat Defense Software IKEV2 Negative Vulnerability (CVSS Score: 8.6) – Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software SSL VPN Rejection Vulnerability Vulnerability CVE-2025-20136 (CVSS Score: 8.6) – CISCO Secure Secure Firewall Adaptive Security Appliances and Secure Firewall Threat Defense Appliances and Secure Firewall Threat Defense Appliances and Secure Firewall Threat Defense Appliances and Secure Firewall Threat Defense Appliances and Secure Firewall Threat Defense Appliances and Secure Firewall Threat Defense Appliances and Secure Firewall Threat Defense Appliances and Secure Firewall Threat Defense Appliances and Secure Firewall Defense Software Network Address Address Translation DNS Check Rejection Vulnerability CVE-2025-20263 (CVSS Score: 8.6) CVE-2025-20148 (CVSS Score: 8.5) – Cisco Secure Firewall Management Center Software HTML Injection Vulnerability CVE-2025-20251 (CVSS Score: 8.5) – Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Software 7.7) – Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software For Firepower 3100 and 4200 Series TLS 1.3 CIPHEN Negative Vulnerability CVE-2025-20244 (CVSS Score: 7.7)

Network appliances are repeatedly caught up in the attacker’s crosshairs, so there is no flaw under aggressive exploitation in the wild, but it is essential that users move quickly to update their instances to the latest version.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleThe US government is reportedly being debated to place a bet on Intel
Next Article Global challenges with local solutions
user
  • Website

Related Posts

North Korean agents impersonate experts on LinkedIn to infiltrate companies

February 10, 2026

Reynolds ransomware embeds BYOVD drivers that disable EDR security tools

February 10, 2026

Inside the rise of the digital parasite

February 10, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

VC Marcia Butcher, an associate of Epstein and founder of Day One, explains it herself.

Google sends student journalists’ personal and financial information to ICE

Almost half of xAI’s founding team has now left the company.

North Korean agents impersonate experts on LinkedIn to infiltrate companies

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.