CVE-2026-20002
Cisco · Secure FMC Software
The web-based management interface of Cisco Secure FMC Software is vulnerable to an authenticated SQL injection attack, allowing attackers to manipulate or extract sensitive database information.
Executive summary
Authenticated attackers can perform SQL injection on Cisco Secure FMC management interfaces, potentially leading to full database compromise and unauthorized administrative control.
Vulnerability
A flaw in the web-based management interface fails to properly sanitize user-supplied input, allowing an authenticated, remote attacker to execute arbitrary SQL commands. This bypasses standard application logic to interact directly with the underlying database.
Business impact
This vulnerability carries a CVSS score of 8.1, reflecting a High-severity risk to data confidentiality and integrity. A successful SQL injection can allow an attacker to read sensitive configuration data, modify security policies, or escalate privileges within the Management Center. This could result in a total compromise of the network security management infrastructure.
Remediation
Immediate Action: Apply the vendor-supplied patches for Cisco Secure FMC immediately to address the input validation flaw.
Proactive Monitoring: Enable and review database query logs for suspicious patterns, such as unexpected "UNION" selects or unusual characters in management interface requests.
Compensating Controls: Restrict access to the FMC management interface to a dedicated, isolated management network or VPN, and enforce the principle of least privilege for all administrative accounts.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Because the FMC manages critical security infrastructure, this vulnerability must be addressed with extreme urgency. Apply the necessary patches immediately and ensure that all management traffic is strictly controlled and monitored to prevent unauthorized access to the web interface.