Loading HuntDB...

CVE-2025-20265

CRITICAL
Published 2025-08-14T16:30:03.286Z
Actions:

Expert Analysis

Professional remediation guidance

Get tailored security recommendations from our analyst team for CVE-2025-20265. We'll provide specific mitigation strategies based on your environment and risk profile.

CVSS Score

V3.1
10.0
/10
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Base Score Metrics
Exploitability: N/A Impact: N/A

Attack Vector Metrics

Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED

Impact Metrics

Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH

Description

A vulnerability in the RADIUS subsystem implementation of Cisco Secure Firewall Management Center (FMC) Software could allow an unauthenticated, remote attacker to inject arbitrary shell commands that are executed by the device. 

This vulnerability is due to a lack of proper handling of user input during the authentication phase. An attacker could exploit this vulnerability by sending crafted input when entering credentials that will be authenticated at the configured RADIUS server. A successful exploit could allow the attacker to execute commands at a high privilege level.
Note: For this vulnerability to be exploited, Cisco Secure FMC Software must be configured for RADIUS authentication for the web-based management interface, SSH management, or both.

Available Exploits

No exploits available for this CVE.

Related News

Cisco fixed maximum-severity security flaw in Secure Firewall Management Center

Cisco patches critical Secure Firewall Management Center flaw allowing remote code execution on vulnerable systems. Cisco released security updates to address a maximum-severity security vulnerability, tracked as CVE-2025-20265 (CVSS score of 10.0), in Secure…

Securityaffairs.com 2025-08-15 08:31

Affected Products

EU Vulnerability Database

Monitored by ENISA for EU cybersecurity

EU Coordination

EU Coordinated

Exploitation Status

No Known Exploitation

ENISA Analysis

A vulnerability in the RADIUS subsystem implementation of Cisco Secure Firewall Management Center (FMC) Software could allow an unauthenticated, remote attacker to inject arbitrary shell commands that are executed by the device. 

This vulnerability is due to a lack of proper handling of user input during the authentication phase. An attacker could exploit this vulnerability by sending crafted input when entering credentials that will be authenticated at the configured RADIUS server. A successful exploit could allow the attacker to execute commands at a high privilege level.
Note: For this vulnerability to be exploited, Cisco Secure FMC Software must be configured for RADIUS authentication for the web-based management interface, SSH management, or both.

Affected Products (ENISA)

cisco
cisco firepower management center

ENISA Scoring

CVSS Score (3.1)

10.0
/10
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

EPSS Score

0.570
probability

Data provided by ENISA EU Vulnerability Database. Last updated: August 16, 2025

GitHub Security Advisories

Community-driven vulnerability intelligence from GitHub

⚠ Unreviewed CRITICAL

GHSA-rc2h-jcr9-jm85

Advisory Details

A vulnerability in the RADIUS subsystem implementation of Cisco Secure Firewall Management Center (FMC) Software could allow an unauthenticated, remote attacker to inject arbitrary shell commands that are executed by the device.  This vulnerability is due to a lack of proper handling of user input during the authentication phase. An attacker could exploit this vulnerability by sending crafted input when entering credentials that will be authenticated at the configured RADIUS server. A successful exploit could allow the attacker to execute commands at a high privilege level. Note: For this vulnerability to be exploited, Cisco Secure FMC Software must be configured for RADIUS authentication for the web-based management interface, SSH management, or both.

CVSS Scoring

CVSS Score

9.0

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

Advisory provided by GitHub Security Advisory Database. Published: August 14, 2025, Modified: August 16, 2025

Social Media Intelligence

Real-time discussions and threat intelligence from social platforms

8 posts
Reddit 1 day, 8 hours ago
Immediate_Gold9789
Payload

Cisco Secure Firewall RADIUS Injection (CVE-2025-20265) Critical Command Injection via AAA/RADIUS → Compromise of the Management Plane https://preview.redd.it/w0zqtt4mxhkf1.png?width=1536&format=png&auto=webp&s=5a266d1e9cb61e264b48efd134dd586cd5b04298 # 🚨 Executive Summary **CVE-2025-20265** is a **critical command injection** flaw affecting the **Cisco Secure Firewall / Firepower Management** control plane when **RADIUS** is configured for external authentication (AAA). A malicious or …

Reddit 1 day, 22 hours ago
Steve_Dobbs_69

CVE-2025-20265: Cisco Secure Firewall Management Center RADIUS Authentication Vulnerability

Reddit 6 days, 2 hours ago
crstux
Exploit

🔥 Top 10 Trending CVEs (17/08/2025) Here’s a quick breakdown of the 10 most interesting vulnerabilities trending today: **1. [CVE-2025-26633](https://nvd.nist.gov/vuln/detail/CVE-2025-26633)** - 📝 Microsoft Management Console Security Feature Bypass Vulnerability - 📅 **Published:** 11/03/2025 - 📈 **CVSS:** 7 - 🧭 **Vector:** CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C - 📣 **Mentions:** 61 - ⚠️ **Priority:** 2 - …

1
1.0
View Original High Risk
Reddit 1 week ago
crstux
Exploit

🔥 Top 10 Trending CVEs (16/08/2025) Here’s a quick breakdown of the 10 most interesting vulnerabilities trending today: **1. [CVE-2023-44487](https://nvd.nist.gov/vuln/detail/CVE-2023-44487)** - 📝 The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October …

2
2.0
View Original High Risk
Reddit 1 week ago
_cybersecurity_

Cisco Addresses Critical Flaw in Firewall Management System **Cisco has released essential security patches to address a critical vulnerability in its Firewall Management Center that could allow unauthorized code execution.** **Key Points:** - A critical vulnerability (CVE-2025-20265) affects Cisco's Secure Firewall Management Center. - The flaw can be exploited by …

Reddit 1 week, 1 day ago
crstux
Exploit

🔥 Top 10 Trending CVEs (15/08/2025) Here’s a quick breakdown of the 10 most interesting vulnerabilities trending today: **1. [CVE-2025-50167](https://nvd.nist.gov/vuln/detail/CVE-2025-50167)** - 📝 Windows Hyper-V Elevation of Privilege Vulnerability - 📅 **Published:** 12/08/2025 - 📈 **CVSS:** 7 - 🧭 **Vector:** CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C - 📣 **Mentions:** 2 - ⚠️ **Priority:** 2 - 📝 …

1
1.0
View Original High Risk
Reddit 1 week, 1 day ago
falconupkid

Cisco Warns of CVSS 10.0 FMC RADIUS Flaw Allowing Remote Code Execution Cisco has released security updates to address a maximum-severity security flaw in Secure Firewall Management Center (FMC) Software that could allow an attacker to execute arbitrary code on affected systems. The vulnerability, assigned... **CVEs:** CVE-2025-20265 **Source:** https://thehackernews.com/2025/08/cisco-warns-of-cvss-100-fmc-radius-flaw.html

Reddit 1 week, 1 day ago
systemtek-co-uk

Cisco Secure Firewall Management Center Software RADIUS Remote Code Execution Vulnerability (CVE-2025-20265)

References

Published: 2025-08-14T16:30:03.286Z
Last Modified: 2025-08-16T03:55:50.492Z
Copied to clipboard!