ThreatCluster
About Blog Help Contact
Login
  • Feed
  • Dashboard
  • Saved
THREAT HUNTING
  • Domains
  • IP Addresses
  • File Hashes
  • CVEs
THREAT INTELLIGENCE
  • APT Groups
  • Ransomware Groups
  • Malware Families
  • Attack Types
  • MITRE ATT&CK
  • Security Standards
  • Vulnerability Types
BUSINESS INTELLIGENCE
  • Companies
  • Industry Sectors
  • Security Vendors
  • Government Agencies
  • Countries
  • Platforms
Home / Feed / Article

Cisco Warns of CVSS 10.0 FMC RADIUS Flaw Allowing Remote Code Execution

Threat Score:
79
The Hacker News
3 hours ago
Part of cluster #1983

Overview

Cisco has released security updates to address a maximum-severity security flaw in Secure Firewall Management Center (FMC) Software that could allow an attacker to execute arbitrary code on affected systems. The vulnerability, assigned the CVE identifierCVE-2025-20265(CVSS score: 10.0), affects the RADIUS subsystem implementation that could permit an unauthenticated, remote attacker to inject arbitrary shell commands that are executed by the device. The networking equipment major said the issue ...

Continue Reading on Original Site

Related Articles

5 articles
1

Cisco Patches Critical Vulnerability in Firewall Management Platform

SecurityWeek • 3 hours ago

Cisco has released over 20 advisories as part of its August 2025 bundled publication for ASA, FMC and FTD products.

Score
90
Read more
2

‘Blue Locker’ Ransomware Targeting Oil & Gas Sector in Pakistan

Security Affairs • 2 hours ago

Blue Locker ransomware hits Pakistan’s oil & gas sector, severely impacting Pakistan Petroleum; NCERT warns ministries of severe ongoing risk. This week Pakistan’s National Cyber Emergency Response Team (NCERT – National CERT – Pakistan) has issued an advisory to 39 key ministries and institutions and warned them of a “severe risk” posed by the ongoing […]

Score
87
Read more
3

Palo Alto GlobalProtect Vulnerability Allows Privilege Escalation via Certificate Bypass

GB Hackers • 1 hour ago

Palo Alto GlobalProtect Vulnerability Allows Privilege Escalation via Certificate Bypass A newly disclosed vulnerability in Palo Alto Networks’ GlobalProtect application could allow attackers to escalate privileges and install malicious software on affected systems through improper certificate validation. The security flaw, tracked asCVE-2025-2183, was published on August 13, 2025, and affects multiple versions of the popular VPN client across Windows and Linux platforms. Critical Security Flaw

Score
85
Read more
4
Stop Reacting; Start Anticipating: The Global State of Threat Intelligence

Stop Reacting; Start Anticipating: The Global State of Threat Intelligence

Brighttalk • 19 hours ago

Presented by Jitin Shabadu, Forrester Analyst | Jayce Nichols, Director, Intelligence Solutions, Google Threat Intelligence Group

Score
83
Read more
5
Source Code of ERMAC V3.0 Malware Exposed by ‘changemeplease’ Password

Source Code of ERMAC V3.0 Malware Exposed by ‘changemeplease’ Password

GB Hackers • 2 hours ago

Source Code of ERMAC V3.0 Malware Exposed by ‘changemeplease’ Password A significant security breach has exposed the complete source code of ERMAC V3.0, a sophisticated banking trojan that targets over 700 financial applications worldwide. The leak,discoveredby cybersecurity firm Hunt.io in March 2024, was made possible by a surprisingly weak default password: “changemeplease.” The discovery occurred when Hunt.io researchers identified an open directory containing the complete ERMAC V3.0 source

Score
83
Read more

Save to Folder

Choose a folder to save this article:

Article Intelligence

Key entities and indicators for this article

CVES
CVE-2025-20127
CVE-2025-20133
CVE-2025-20134
CVE-2025-20136
CVE-2025-20148
ATTACK TYPES
Command Injection
Remote Code Execution
VULNERABILITIES
Remote Code Execution
COMPANIES
Cisco
PLATFORMS
Cisco IOS
Cisco Secure Firewall
iOS
MITRE ATT&CK
T1059.003
T1071.001
T1190
T1203
T1486
INDUSTRIES
Information Technology
Network Security
ARTICLE INFORMATION
Article #11902
Published 3 hours ago
The Hacker News

We use cookies

We use cookies and similar technologies to enhance your experience, analyse site usage, and assist in our marketing efforts.

Cookie Settings

Essential Cookies

Required for the website to function. Cannot be disabled.

  • Session management and authentication
  • Security and fraud prevention
  • Cookie consent preferences

Analytics Cookies

Help us understand how visitors interact with our website.

  • Plausible Analytics - Privacy-focused usage statistics
  • PostHog - Product analytics and feature tracking
  • Page views and user journey analysis

Performance Cookies

Help us monitor and improve website performance.

  • Page load time monitoring
  • Error tracking and debugging
  • Performance optimisation

Marketing Cookies

Used to track visitors across websites for marketing purposes.

  • Conversion tracking
  • Remarketing campaigns
  • Social media integration