Description

A vulnerability in the lockdown mechanism of Cisco Secure Firewall Management Center (FMC) Software could allow an authenticated, local attacker to perform arbitrary commands as root. This vulnerability is due to insufficient restrictions on remediation modules while in lockdown mode. An attacker could exploit this vulnerability by sending crafted input to the system CLI of the affected device. A successful exploit could allow the attacker to run arbitrary commands or code as root, even when the system is in lockdown mode. To exploit this vulnerability, the attacker must have valid administrative credentials.

INFO

Published Date :

2026-03-04T17:17:41.169Z

Last Modified :

2026-03-05T14:05:46.010Z

Source :

cisco
AFFECTED PRODUCTS

The following products are affected by CVE-2026-20044 vulnerability.

Vendors Products
Cisco
  • Secure Firewall Management Center
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2026-20044.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact