Home

Description

A vulnerability in the Cisco FXOS Software CLI feature for Cisco Secure Firewall ASA Software and Secure FTD Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system with root-level privileges. To exploit this vulnerability, the attacker must have valid administrative credentials on an affected device. This vulnerability is due to insufficient input validation of user-supplied command arguments. An attacker could exploit this vulnerability by submitting crafted input for specific CLI commands. A successful exploit could allow the attacker to execute commands on the underlying operating system with root-level privileges.

PUBLISHED Reserved 2025-10-08 | Published 2026-03-04 | Updated 2026-03-05 | Assigner cisco




MEDIUM: 6.0CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N

Problem types

Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')

Product status

7.0.0
affected

7.0.0.1
affected

7.0.1
affected

7.0.1.1
affected

7.0.2
affected

7.0.2.1
affected

7.0.3
affected

7.0.4
affected

7.0.5
affected

7.0.6
affected

7.0.6.1
affected

7.0.6.2
affected

7.0.6.3
affected

7.0.7
affected

7.0.8
affected

7.0.8.1
affected

7.1.0
affected

7.1.0.1
affected

7.1.0.3
affected

7.2.0
affected

7.2.0.1
affected

7.2.1
affected

7.2.2
affected

7.2.3
affected

7.2.4
affected

7.2.4.1
affected

7.2.5
affected

7.2.5.1
affected

7.2.6
affected

7.2.7
affected

7.2.5.2
affected

7.2.8
affected

7.2.8.1
affected

7.2.9
affected

7.2.10
affected

7.2.10.2
affected

7.3.0
affected

7.3.1
affected

7.3.1.1
affected

7.3.1.2
affected

7.4.1
affected

7.4.1.1
affected

7.4.2
affected

7.4.2.1
affected

7.4.2.2
affected

7.4.2.3
affected

7.4.2.4
affected

7.4.3
affected

7.6.0
affected

7.6.1
affected

7.6.2
affected

7.6.2.1
affected

7.7.0
affected

7.7.10
affected

7.7.10.1
affected

References

sec.cloudapps.cisco.com/...ory/cisco-sa-ftd-cmd-inj-mTzGZexf (cisco-sa-ftd-cmd-inj-mTzGZexf)

cve.org (CVE-2026-20016)

nvd.nist.gov (CVE-2026-20016)

Download JSON