CISA KEV: Cisco FMC Vulnerability Allows Root Java Code Execution (CVE-2026-20131)
Summary
CISA has added a critical vulnerability in Cisco Secure Firewall Management Center (FMC) Software to its Known Exploited Vulnerabilities (KEV) catalog. The vulnerability (CVE-2026-20131) allows unauthenticated remote attackers to execute arbitrary Java code as root. Organizations are required to address this vulnerability by April 4, 2026.
What changed
CISA has added CVE-2026-20131, a critical vulnerability in Cisco Secure Firewall Management Center (FMC) Software, to its Known Exploited Vulnerabilities (KEV) catalog. This vulnerability stems from insecure deserialization and allows an unauthenticated, remote attacker to execute arbitrary Java code as root on affected devices. The CVSS score is 10.0 (CRITICAL), with an active exploitation status and high technical impact.
Federal agencies and organizations using affected Cisco FMC versions must implement required mitigations or workarounds by April 4, 2026, to address this known exploited vulnerability. Failure to comply may result in increased scrutiny and potential enforcement actions. Organizations should prioritize patching or applying vendor-recommended mitigations to prevent exploitation.
What to do next
- Apply vendor patches or mitigations for Cisco FMC versions affected by CVE-2026-20131.
- Review network access controls to limit exposure of FMC management interfaces.
- Confirm successful remediation of the vulnerability.
Source document (simplified)
Required CVE Record Information
CNA: Cisco Systems, Inc.
Description
A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FMC) Software could allow an unauthenticated, remote attacker to execute arbitrary Java code as root on an affected device.
This vulnerability is due to insecure deserialization of a user-supplied Java byte stream. An attacker could exploit this vulnerability by sending a crafted serialized Java object to the web-based management interface of an affected device. A successful exploit could allow the attacker to execute arbitrary code on the device and elevate privileges to root.
Note: If the FMC management interface does not have public internet access, the attack surface that is associated with this vulnerability is reduced.
CWE 1 Total
Learn more
- CWE-502: Deserialization of Untrusted Data
CVSS 1 Total
Learn more
| Score | Severity | Version | Vector String |
| --- | --- | --- | --- |
| 10.0 | CRITICAL | 3.1 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H |
Product Status
Learn more Versions 71 Total
Default Status: unknown
affected
affected at 6.4.0.13
affected at 6.4.0.14
affected at 6.4.0.15
affected at 6.4.0.16
affected at 6.4.0.17
affected at 6.4.0.18
affected at 7.0.0
affected at 7.0.0.1
affected at 7.0.1
affected at 7.0.1.1
affected at 7.0.2
affected at 7.0.2.1
affected at 7.0.3
affected at 7.0.4
affected at 7.0.5
affected at 7.0.6
affected at 7.0.6.1
affected at 7.0.6.2
affected at 7.0.6.3
affected at 7.0.7
affected at 7.0.8
affected at 7.0.8.1
affected at 7.1.0
affected at 7.1.0.1
affected at 7.1.0.2
affected at 7.1.0.3
affected at 7.2.0
affected at 7.2.1
affected at 7.2.2
affected at 7.2.0.1
affected at 7.2.3
affected at 7.2.3.1
affected at 7.2.4
affected at 7.2.4.1
affected at 7.2.5
affected at 7.2.5.1
affected at 7.2.6
affected at 7.2.7
affected at 7.2.5.2
affected at 7.2.8
affected at 7.2.8.1
affected at 7.2.9
affected at 7.2.10
affected at 7.2.10.2
affected at 7.2.10.1
affected at 7.3.0
affected at 7.3.1
affected at 7.3.1.1
affected at 7.3.1.2
affected at 7.4.0
affected at 7.4.1
affected at 7.4.1.1
affected at 7.4.2
affected at 7.4.2.1
affected at 7.4.2.2
affected at 7.4.2.3
affected at 7.4.2.4
affected at 7.4.3
affected at 7.4.4
affected at 7.4.5
affected at 7.6.0
affected at 7.6.1
affected at 7.6.2
affected at 7.6.2.1
affected at 7.6.3
affected at 7.6.4
affected at 7.7.0
affected at 7.7.10
affected at 7.7.10.1
affected at 7.7.11
affected at 10.0.0
References 1 Total
Authorized Data Publishers
CISA-ADP
Updated:
2026-03-20
SSVC and KEV, plus CVSS and CWE if not provided by the CNA.
SSVC 1 Total
Learn more
| Exploitation | Automatable | Technical Impact | Version | Date Accessed |
| --- | --- | --- | --- | --- |
| active | yes | total | 2.0.3 | 2026-03-04 |
KEV 1 Total
Learn more
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-20131 (2026-03-19)
Related changes
Source
Classification
Who this affects
Taxonomy
Browse Categories
Get Data Privacy & Cybersecurity alerts
Weekly digest. AI-summarized, no noise.
Free. Unsubscribe anytime.
Get alerts for this source
We'll email you when CISA Known Exploited Vulnerabilities (KEV) publishes new changes.