This vulnerability is due to insecure deserialization of a user-supplied Java byte stream. An attacker could exploit this vulnerability by sending a crafted serialized Java object to the web-based management interface of an affected device. A successful exploit could allow the attacker to execute arbitrary code on the device and elevate privileges to root.
Note: If the FMC management interface does not have public internet access, the attack surface that is associated with this vulnerability is reduced.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 19 Mar 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:cisco:secure_firewall_management_center:10.0.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.13:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.14:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.15:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.16:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.17:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.18:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.0.0.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.0.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.0.1.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.0.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.0.2.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.0.2:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.0.3:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.0.4:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.0.5:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.0.6.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.0.6.2:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.0.6.3:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.0.6:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.0.7:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.0.8.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.0.8:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.2:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.3:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.2.0.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.2.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.2.10.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.2.10.2:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.2.10:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.2.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.2.2:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.2.3.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.2.3:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.2.4.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.2.4:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.2.5.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.2.5.2:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.2.5:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.2.6:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.2.7:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.2.8.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.2.8:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.2.9:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.3.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1.2:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.4.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.4.1.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.4.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.4.2.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.4.2.2:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.4.2.3:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.4.2.4:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.4.2:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.4.3:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.4.4:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.4.5:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.6.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.6.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.6.2.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.6.2:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.6.3:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.6.4:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.7.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.7.10.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.7.10:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_firewall_management_center:7.7.11:*:*:*:*:*:*:* |
Thu, 19 Mar 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
ssvc
|
ssvc
|
Thu, 19 Mar 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
kev
|
Thu, 19 Mar 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Thu, 05 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 05 Mar 2026 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Cisco
Cisco secure Firewall Management Center |
|
| Vendors & Products |
Cisco
Cisco secure Firewall Management Center |
Wed, 04 Mar 2026 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FMC) Software could allow an unauthenticated, remote attacker to execute arbitrary Java code as root on an affected device. This vulnerability is due to insecure deserialization of a user-supplied Java byte stream. An attacker could exploit this vulnerability by sending a crafted serialized Java object to the web-based management interface of an affected device. A successful exploit could allow the attacker to execute arbitrary code on the device and elevate privileges to root. Note: If the FMC management interface does not have public internet access, the attack surface that is associated with this vulnerability is reduced. | |
| Weaknesses | CWE-502 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: cisco
Published:
Updated: 2026-03-19T16:20:24.032Z
Reserved: 2025-10-08T11:59:15.380Z
Link: CVE-2026-20131
Updated: 2026-03-05T14:06:12.803Z
Status : Analyzed
Published: 2026-03-04T18:16:27.153
Modified: 2026-03-19T17:09:34.303
Link: CVE-2026-20131
No data.
OpenCVE Enrichment
Updated: 2026-03-05T09:06:37Z