Critical RADIUS Flaw in Cisco Secure Firewall Management Center Software
Summary
Hide ▲
Show ▼
Cisco has released security updates for a critical vulnerability in Secure Firewall Management Center (FMC) Software. The flaw, CVE-2025-20265, allows unauthenticated remote attackers to execute arbitrary code on affected systems. The issue stems from improper handling of user input during the RADIUS authentication phase. The vulnerability impacts Cisco Secure FMC Software releases 7.0.7 and 7.7.0 with RADIUS authentication enabled. No workarounds are available other than applying the provided patches. The flaw was discovered by Brandon Sakai during internal security testing.
Timeline
-
15.08.2025 09:49 📰 1 articles · ⏱ 1mo ago
Critical RADIUS flaw in Cisco Secure Firewall Management Center Software disclosed
Cisco has disclosed a critical vulnerability, CVE-2025-20265, in Secure Firewall Management Center (FMC) Software. The flaw allows unauthenticated remote attackers to execute arbitrary code due to improper handling of user input during the RADIUS authentication phase. The vulnerability impacts specific software releases and requires RADIUS authentication to be enabled. No workarounds are available, and applying the patches is the only mitigation.
Show sources
- Cisco Warns of CVSS 10.0 FMC RADIUS Flaw Allowing Remote Code Execution — thehackernews.com — 15.08.2025 09:49
Information Snippets
-
The vulnerability, CVE-2025-20265, has a CVSS score of 10.0, indicating maximum severity.
First reported: 15.08.2025 09:49📰 1 source, 1 articleShow sources
- Cisco Warns of CVSS 10.0 FMC RADIUS Flaw Allowing Remote Code Execution — thehackernews.com — 15.08.2025 09:49
-
The flaw affects the RADIUS subsystem implementation, allowing arbitrary shell command injection.
First reported: 15.08.2025 09:49📰 1 source, 1 articleShow sources
- Cisco Warns of CVSS 10.0 FMC RADIUS Flaw Allowing Remote Code Execution — thehackernews.com — 15.08.2025 09:49
-
Exploitation requires RADIUS authentication to be configured for the web-based management interface, SSH management, or both.
First reported: 15.08.2025 09:49📰 1 source, 1 articleShow sources
- Cisco Warns of CVSS 10.0 FMC RADIUS Flaw Allowing Remote Code Execution — thehackernews.com — 15.08.2025 09:49
-
The vulnerability impacts Cisco Secure FMC Software releases 7.0.7 and 7.7.0.
First reported: 15.08.2025 09:49📰 1 source, 1 articleShow sources
- Cisco Warns of CVSS 10.0 FMC RADIUS Flaw Allowing Remote Code Execution — thehackernews.com — 15.08.2025 09:49
-
No workarounds are available; applying the patches is the only mitigation.
First reported: 15.08.2025 09:49📰 1 source, 1 articleShow sources
- Cisco Warns of CVSS 10.0 FMC RADIUS Flaw Allowing Remote Code Execution — thehackernews.com — 15.08.2025 09:49
-
Brandon Sakai of Cisco discovered the issue during internal security testing.
First reported: 15.08.2025 09:49📰 1 source, 1 articleShow sources
- Cisco Warns of CVSS 10.0 FMC RADIUS Flaw Allowing Remote Code Execution — thehackernews.com — 15.08.2025 09:49
Similar Happenings
Active exploitation of CVE-2025-5086 in DELMIA Apriso
CVE-2025-5086, a critical deserialization flaw in Dassault Systèmes DELMIA Apriso Manufacturing Operations Management (MOM) software, is being actively exploited. The vulnerability, with a CVSS score of 9.0, affects versions from Release 2020 through Release 2025. Exploitation attempts have been observed, targeting the /apriso/WebServices/FlexNetOperationsService.svc/Invoke endpoint with a Base64-encoded payload. The payload decodes to a GZIP-compressed Windows executable that deploys a malicious program designed to spy on user activities. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added the flaw to its Known Exploited Vulnerabilities (KEV) catalog, advising Federal Civilian Executive Branch (FCEB) agencies to apply updates by October 2, 2025. The malware, identified as Trojan.MSIL.Zapchast.gen, captures keyboard input, takes screenshots, and gathers information about active applications. This information is then sent to the attacker via various means, including email, FTP, and HTTP. The exploit involves sending a malicious SOAP request to vulnerable endpoints. The malicious requests were observed originating from the IP 156.244.33[.]162.
Akira Ransomware Group Exploits SonicWall SSL VPN Flaws
The Akira ransomware group has been actively exploiting SonicWall SSL VPN flaws and misconfigurations to gain initial access to networks. This campaign has seen increased activity since late July 2025, targeting SonicWall devices to facilitate ransomware operations. The group leverages a combination of security vulnerabilities, including a year-old flaw (CVE-2024-40766) and misconfigured LDAP settings, to bypass access controls and infiltrate networks. Organizations are advised to rotate passwords, remove unused accounts, enable multi-factor authentication, and restrict access to the Virtual Office Portal to mitigate risks. The Australian Cyber Security Centre (ACSC) has acknowledged Akira's targeting of SonicWall SSL VPNs and issued alerts about the increased exploitation of CVE-2024-40766.
Cursor AI editor autoruns malicious code in repositories
A flaw in the Cursor AI code editor allows malicious repositories to execute arbitrary code automatically when opened. This vulnerability can lead to malware installation, environment hijacking, and credential theft. Cursor, an AI-powered IDE based on Visual Studio Code, disables the Workspace Trust feature by default, allowing this behavior. The flaw affects one million users who generate over a billion lines of code daily. Cursor developers have decided not to fix the issue, citing the need to maintain AI and other features. The vulnerability is part of a broader trend of prompt injections and jailbreaks affecting AI-powered coding and reasoning agents, which can embed malicious instructions to perform harmful actions or leak data.
Microsoft September 2025 Patch Tuesday fixes 81 vulnerabilities, including two zero-days
Microsoft released updates for 80 vulnerabilities on September 2025 Patch Tuesday. None of these vulnerabilities were zero-days. The updates address eight critical flaws, including five remote code execution vulnerabilities, one information disclosure, and two elevation of privilege vulnerabilities. The vulnerabilities span various categories: 38 elevation of privilege, 2 security feature bypass, 22 remote code execution, 14 information disclosure, 3 denial of service, and 1 spoofing. One zero-day vulnerability was fixed in Windows SMB Server. The updates also include hardening features for SMB Server to mitigate relay attacks, with recommendations for administrators to enable auditing. The patch includes 38 elevation of privilege vulnerabilities, the highest number among all categories. CVE-2025-54918 is an EoP vulnerability in Windows NT LAN Manager (NTLM) marked as critical. CVE-2025-54111 and CVE-2025-54913 are EoP flaws in Windows UI XAML, allowing privilege escalation via phished credentials or malicious Microsoft Store apps. CVE-2025-55232 is an RCE vulnerability in the Microsoft High Performance Compute (HPC) Pack with a CVSS score of 9.8. CVE-2025-54916 is an RCE vulnerability in Windows NTFS that can be triggered by authenticated users. Microsoft's patch update includes recommendations for preparing for the end-of-life of Windows 10 and mandatory multifactor authentication (MFA) for Azure in October 2025.
Critical SessionReaper flaw in Adobe Commerce and Magento Open Source patched
Adobe has patched a critical vulnerability (CVE-2025-54236) in its Commerce and Magento Open Source platforms, dubbed SessionReaper. The flaw could allow unauthenticated attackers to take control of customer accounts via the Commerce REST API. The vulnerability was disclosed to selected customers on September 4, 2025, with a patch released on September 9, 2025. Adobe Commerce on Cloud users were protected by a WAF rule until the patch was available. The flaw is considered one of the most severe in the history of the platform, potentially leading to session forging, privilege escalation, and code execution. No exploitation in the wild has been reported, but a hotfix was leaked, which could accelerate exploitation attempts. The vulnerability impacts various versions of Adobe Commerce, Adobe Commerce B2B, Magento Open Source, and the Custom Attributes Serializable module. Adobe has also patched a critical path traversal vulnerability in ColdFusion (CVE-2025-54261).