Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Cisco Drops 48 New Firewall Vulnerabilities, 2 Critical
    Cybersecurity

    Cisco Drops 48 New Firewall Vulnerabilities, 2 Critical

    adminBy adminMarch 5, 2026No Comments4 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Cisco Drops 48 New Firewall Vulnerabilities, 2 Critical
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Cisco has disclosed 48 vulnerabilities in its firewall ecosystem, two of which are as critical as vulnerabilities get.

    They affect the following Cisco technologies:

    • Adaptive Security Appliance (ASA), a traditional, stateful firewall

    • Secure FTD (Firewall Threat Defense), a firewall that combines ASA with other, more advanced features

    • Secure Firewall Management Center (FMC), the centralized management system for the firewall and firewall threat defense products

    All 48 issues come with fixes, and Cisco strongly recommends that customers update to the latest version software. That sentiment was echoed by The Netherlands Cyber Security Center (NCSC-NL) in its own security advisory on March 4. It predicted that public proof-of-concepts (PoC) and large-scale attempts at abuse may be incoming for the two critical bugs in the bunch, which impact the Secure FMC.

    Nine more vulnerabilities in Cisco’s advisory earned “high” Common Vulnerability Scoring System (CVSS) scores. For the most part, these are denial of service (DoS) bugs, though they also include SQL injection and unauthorized file access issues. The rest of the batch — more DoS bugs, command injection, and cross-site scripting (XSS) flaws, among others — are considered to be of medium severity.

    Related:Cisco SD-WAN Zero-Day Under Exploitation for 3 Years

    Critical Vulnerabilities in Cisco Secure FMC

    The sheer number of vulnerabilities disclosed this week shouldn’t cause too much brouhaha. Cisco reveals a flood of new ones affecting this trio of products on a semi-annual schedule. Of more concern is a pair of those vulnerabilities that affect the FMC Web interface.

    There’s CVE-2026-20079, caused by a problematic system process created at boot time. With tailored HTTP requests, attackers could bypass authentication and execute scripts and commands that allow them root access to the FMC’s underlying operating system (OS).

    Then there’s CVE-2026-20131, an insecure deserialization issue. If an attacker sends a specially crafted serialized Java object to the FMC’s Web-based management interface, they could remotely execute arbitrary code and potentially elevate their privileges to the root level.

    CVE-2026-20079 and CVE-2026-20131 have both earned the highest possible 10 out of 10 severity score in the CVSS scale.

    “Cisco effectively positions FMC as the ‘nerve center’ for unified firewall and threat management,” Jeff Liford, associate director at Fenix24, points out. To hammer home just how significant these issues are, he compares them to Cisco’s other 10 out of 10 vulnerability that made the rounds last week, in the Catalyst SD-WAN Controller. That zero-day flaw, CVE-2026-20127, was exploited by an unknown but sophisticated threat actor in targeted attacks.

    Related:SolarWinds WHD Attacks Highlight Risks of Exposed Apps

    “Where a compromise of SD-WAN management could give attackers control of enterprise routing between sites, compromise of FMC could allow an attacker to undermine network security controls at a much deeper level,” Liford says. “An attacker with administrative access to FMC could potentially modify firewall rules, disable inspection controls, or push malicious configurations across multiple devices simultaneously.”

    Edge Attacks Outpace Defenses

    Cyberattacks at the network edge have been in vogue since at least 2024, led by nation-state threat groups, particularly those aligned with China.

    In part, that’s because these devices are naturally such good entry points into networks. “The return on a single management-plane compromise exceeds what you get from a hundred endpoint compromises,” says Collin Hogue-Spears, senior director of solution management at Black Duck, “because the firewall does not just protect the network. It defines the network.”

    Vendors in this space have also had immense trouble clamping down on security holes in their products. Hogue-Spears points out that more known exploited vulnerabilities (KEVs) affected edge devices in 2025 than any other technology, according to VulnCheck. 

    Related:Microsoft Patches 6 Actively Exploited Zero-Days

    Even more strikingly, Verizon’s 2025 Data Breach Investigations Report (DBIR) found a near-eightfold increase in zero-day exploitation of edge devices in 2024 compared to 2023. And in February, the Cybersecurity and Infrastructure Security Agency (CISA) tried to get a handle on its edge problems with the Binding Operational Directive (BOD) 26-02, which ordered federal agencies to find and scrap all end-of-support firewall, router, and VPN gateways within 18 months. 

    “That directive did not come from theoretical risk modeling. It came from incident response data showing nation-state groups using Cisco, Fortinet, Palo Alto, Ivanti, and Juniper devices as their primary initial access vector for two consecutive years,” Hogue-Spears says.

    In his view, most organizations are not keeping pace with the problem. “Defenders built their entire detection stack around endpoint agents and SIEM correlation. Edge devices sit outside that stack, generate their own logs, and run opaque firmware that no third-party tool can inspect,” he says. “Until that architecture changes, firewalls and edge appliances will remain the preferred front door.”

    Hogue-Spears recommends that organizations run the Cisco Software Checker against affected devices as soon as possible, and review which other devices at the edge of their networks might be at risk: “An unpatched firewall is an unlocked door with a welcome mat.”

    Cisco Critical Drops firewall Vulnerabilities
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleWhat SMEC’s Data Reveals About AI Max Performance
    Next Article Data center new builds diminish even as demand rises
    admin
    • Website

    Related Posts

    Russian Ransomware Operator Pleads Guilty in US

    March 5, 2026

    Cisco Confirms Active Exploitation of Two Catalyst SD-WAN Manager Vulnerabilities

    March 5, 2026

    Fideo Intelligence enhances dark web monitoring capabilities to reduce payment fraud

    March 5, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    Russian Ransomware Operator Pleads Guilty in US

    March 5, 2026

    Pixel Weather app update brings new redesigned icons

    March 5, 2026

    Data center new builds diminish even as demand rises

    March 5, 2026

    Cisco Drops 48 New Firewall Vulnerabilities, 2 Critical

    March 5, 2026
    Categories
    • Blogging (33)
    • Cybersecurity (623)
    • Privacy & Online Earning (92)
    • SEO & Digital Marketing (395)
    • Tech Tools & Mobile / Apps (760)
    • WiFi / Internet & Networking (112)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    Russian Ransomware Operator Pleads Guilty in US

    March 5, 2026

    Pixel Weather app update brings new redesigned icons

    March 5, 2026

    Data center new builds diminish even as demand rises

    March 5, 2026
    Most Popular
    • Russian Ransomware Operator Pleads Guilty in US
    • Pixel Weather app update brings new redesigned icons
    • Data center new builds diminish even as demand rises
    • Cisco Drops 48 New Firewall Vulnerabilities, 2 Critical
    • What SMEC’s Data Reveals About AI Max Performance
    • This Ultra phone first to use Sony’s new 200MP camera sensor
    • Cisco Confirms Active Exploitation of Two Catalyst SD-WAN Manager Vulnerabilities
    • Yep, Amazon Is Down | Lifehacker
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.