Cisco’s Firewall Flop: The RADIUS RCE Rodeo You Can’t Ignore!
Cisco’s Secure Firewall Management Center Software has a vulnerability so severe it could have its own action movie. Dubbed CVE-2025-20265, this flaw lets attackers execute arbitrary commands, giving it a perfect 10 on the CVSS scale. Cisco urges immediate updates—because nobody wants their network starring in “Hackers: The Sequel.”

Hot Take:
The Cisco Secure Firewall Management Center is basically a bouncer with a drinking problem. It’s supposed to keep the riff-raff out, but instead, it might just let them in if they know the password. But fear not, Cisco’s got the antidote – a software update served on the house! Better install it before the bouncer starts inviting rogue party crashers to your network shindig.
Key Points:
- Critical RCE vulnerability (CVE-2025-20265) with a maximum severity score of 10.0.
- Affects Cisco Secure FMC Software releases 7.0.7 and 7.7.0 with RADIUS enabled.
- Exploitation allows unauthenticated attackers to inject arbitrary shell commands.
- No workarounds, but switching authentication methods can mitigate risk.
- Free software update available for customers to fix the vulnerability.
Already a member? Log in here