Cisco Releases Critical Security Patches for Enterprise Networking Products

Cisco-Releases-Critical-Security-Patches-for-Enterprise-Networking-Productsdata

Cisco Releases Security Patches for Enterprise Networking Products

Cisco recently released a batch of security patches for its enterprise networking products, addressing a total of 50 vulnerabilities across various platforms.

Critical Vulnerabilities

Two critical-severity flaws were disclosed, both affecting the Cisco Secure FMC software.

According to Cisco, the first critical vulnerability, tracked as CVE-2026-20079, carries a CVSS score of 10/10 and is described as an authentication bypass in the web interface of Secure FMC.

This flaw can be exploited by sending crafted HTTP requests to a vulnerable device, allowing an attacker to execute arbitrary scripts and gain root access to the underlying operating system.

The vulnerability arises from an improper system process created at boot time.

The second critical issue, CVE-2026-20131, also affects the web interface of Secure FMC and carries a CVSS score of 10/10.

This vulnerability allows an attacker to execute Java code with root privileges by sending a crafted Java byte stream to the affected device.

The weakness exists due to insecure deserialization of user-supplied Java objects.

Successful exploitation could allow an attacker to execute arbitrary code on the device and elevate privileges to root.

However, Cisco notes that the exploitation risk is lower for FMC management interfaces that are not accessible from the internet.

High-Severity Flaws

In addition to the critical vulnerabilities, Cisco also addressed nine high-severity flaws in the ASA Firewall, Secure FMC, and Secure FTD appliances.

These vulnerabilities could be exploited to conduct SQL injection attacks, cause denial-of-service (DoS) conditions, and read, create, or overwrite sensitive files.

Medium-Severity Issues

The remaining 39 flaws addressed in the update are medium-severity issues.

Cisco also released patches for medium-severity security defects in Webex and ClamAV.

The company is not aware of any of these vulnerabilities being exploited in the wild and advises users to update their deployments as soon as possible.

Patch Details

The patches are part of Cisco’s March 2026 bundled publication, which contains 25 security advisories describing the security defects affecting the company’s enterprise networking products.



About Author

en_USEnglish