ThreatCluster
About Blog Help Contact
Login
  • Feed
  • Dashboard
  • Saved
THREAT HUNTING
  • Domains
  • IP Addresses
  • File Hashes
  • CVEs
THREAT INTELLIGENCE
  • APT Groups
  • Ransomware Groups
  • Malware Families
  • Attack Types
  • MITRE ATT&CK
  • Security Standards
  • Vulnerability Types
BUSINESS INTELLIGENCE
  • Companies
  • Industry Sectors
  • Security Vendors
  • Government Agencies
  • Countries
  • Platforms
Home / Feed / Article

Cisco Secure Firewall Vulnerability Lets Attackers Execute Remote Shell Commands

Threat Score:
73
GB Hackers
8 hours ago
Part of cluster #1983

Overview

Cisco Secure Firewall Vulnerability Lets Attackers Execute Remote Shell Commands Cisco has disclosed a critical security vulnerability in its Secure Firewall Management Center software that could allow unauthenticated attackers to remotely execute shell commands with elevated privileges. The flaw, tracked as CVE-2025-20265, carries a maximum CVSS score of 10.0 and affects organizations using RADIUS authentication for their firewall management interfaces. Critical Remote Code Execution Flaw Disco...

Continue Reading on Original Site

Related Articles

5 articles
1

Cisco Patches Critical Vulnerability in Firewall Management Platform

SecurityWeek • 6 hours ago

Cisco has released over 20 advisories as part of its August 2025 bundled publication for ASA, FMC and FTD products.

Score
88
Read more
2

Cisco Discloses Critical RCE Flaw in Firewall Management Software

Infosecurity Magazine • 3 hours ago

Cisco has issued a software update to address the vulnerability, which can allow an unauthenticated, remote attacker to inject arbitrary shell commands

Score
87
Read more
3

Tight Cybersecurity Budgets Accelerate the Shift to AI-Driven Defense

SecurityWeek • 4 hours ago

With cybersecurity budgets strained, organizations are turning to AI-powered automation to plug staffing gaps, maintain defenses, and survive escalating threats.

Score
87
Read more
4

‘Blue Locker’ Ransomware Targeting Oil & Gas Sector in Pakistan

Security Affairs • 6 hours ago

Blue Locker ransomware hits Pakistan’s oil & gas sector, severely impacting Pakistan Petroleum; NCERT warns ministries of severe ongoing risk. This week Pakistan’s National Cyber Emergency Response Team (NCERT – National CERT – Pakistan) has issued an advisory to 39 key ministries and institutions and warned them of a “severe risk” posed by the ongoing […]

Score
85
Read more
5

Phishing Campaign Exploits Japanese Character “ん” to Imitate Forward Slash

GB Hackers • 2 hours ago

Phishing Campaign Exploits Japanese Character “ん” to Imitate Forward Slash Security researchers have uncovered a sophisticated new phishing campaign that exploits the Japanese hiragana character “ん” to create deceptively authentic-looking URLs that can fool even vigilant internet users. The attack, firstidentifiedby security researcher JAMESWT, represents a significant evolution in homograph attacks that leverage visual similarities between characters from different Unicode sets. The malicious c

Score
84
Read more

Save to Folder

Choose a folder to save this article:

Article Intelligence

Key entities and indicators for this article

CVES
CVE-2025-20265
ATTACK TYPES
Command Injection
Ransomware
Remote Code Execution
Remote Command Execution
INDUSTRIES
Banking
Cybersecurity
Education
Information Technology
Network Security
VULNERABILITIES
Command Injection
DDoS
DoS
Remote Code Execution
COMPANIES
AMD
Adobe
Amazon
Apple
Cisco
SECURITY VENDORS
Cloudflare
PLATFORMS
AWS
Android
Apache
Azure
Cisco Secure Firewall
APT GROUPS
Cobalt
RANSOMWARE
AnDROid
Zlader
MALWARE
Cobalt Strike
Dark
ERMAC
Leverage
Pay2Key
MITRE ATT&CK
T1036
T1059.003
T1068
T1070.001
T1071.001
ARTICLE INFORMATION
Article #11911
Published 8 hours ago
GB Hackers

We use cookies

We use cookies and similar technologies to enhance your experience, analyse site usage, and assist in our marketing efforts.

Cookie Settings

Essential Cookies

Required for the website to function. Cannot be disabled.

  • Session management and authentication
  • Security and fraud prevention
  • Cookie consent preferences

Analytics Cookies

Help us understand how visitors interact with our website.

  • Plausible Analytics - Privacy-focused usage statistics
  • PostHog - Product analytics and feature tracking
  • Page views and user journey analysis

Performance Cookies

Help us monitor and improve website performance.

  • Page load time monitoring
  • Error tracking and debugging
  • Performance optimisation

Marketing Cookies

Used to track visitors across websites for marketing purposes.

  • Conversion tracking
  • Remarketing campaigns
  • Social media integration