Cybersecurity News and Headlines
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Cybersecurity Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Tuesday recap

NewsDealsSocialBlogsVideosPodcasts
HomeTechnologyCybersecurityNewsCisco Drops 48 New Firewall Vulnerabilities, 2 Critical
Cisco Drops 48 New Firewall Vulnerabilities, 2 Critical
CybersecurityEnterpriseCIO PulseDefenseHardware

Cisco Drops 48 New Firewall Vulnerabilities, 2 Critical

•March 5, 2026
0
Dark Reading
Dark Reading•Mar 5, 2026

Why It Matters

Compromise of the FMC could let attackers rewrite firewall policies, effectively disabling network defenses. Prompt remediation is essential to prevent nation‑state actors from leveraging these high‑impact flaws.

Key Takeaways

  • •Cisco reports 48 firewall vulnerabilities, two critical
  • •Critical CVEs allow authentication bypass and remote code execution
  • •All issues have patches; Cisco urges immediate updates
  • •NCSC‑NL warns of imminent proof‑of‑concept attacks
  • •Edge device exploits rising; firewalls become prime attack surface

Pulse Analysis

Cisco’s latest advisory underscores a persistent challenge for enterprise security teams: keeping critical network infrastructure up‑to‑date. The 48 disclosed flaws span the Adaptive Security Appliance, Secure FTD and the centralized Secure FMC, but the two CVE‑2026‑20079 and CVE‑2026‑20131 vulnerabilities stand out. Both grant unauthenticated attackers the ability to execute arbitrary commands on the FMC’s underlying operating system, effectively handing over control of firewall rule sets, inspection policies and threat‑prevention modules. With a CVSS score of 10, these bugs rank among the most severe ever reported for Cisco’s edge devices, and the Dutch NCSC’s advisory signals that active exploitation may follow soon.

The incident reflects a broader shift in threat actor tactics toward the network edge. Recent data from Verizon’s DBIR shows an eight‑fold increase in zero‑day attacks targeting firewalls, routers and VPN gateways between 2023 and 2024, driven largely by nation‑state groups seeking persistent footholds. The U.S. CISA’s Binding Operational Directive 26‑02 further emphasizes the urgency, mandating the removal of end‑of‑support edge equipment across federal agencies. As edge devices operate outside traditional endpoint‑centric detection stacks, they present a blind spot that sophisticated adversaries exploit to bypass SIEM correlation and endpoint agents.

For organizations, the path forward hinges on disciplined patch management and visibility into edge assets. Cisco’s Software Checker can quickly identify vulnerable firmware versions, while automated remediation pipelines should be integrated with change‑control processes to minimize downtime. Beyond patching, security teams must augment their monitoring stack with dedicated telemetry from firewalls and incorporate behavior‑based analytics that can flag anomalous management‑plane activity. By treating the firewall as a critical component of the overall attack surface rather than a peripheral control point, enterprises can better defend against the escalating risk of edge‑focused exploits.

Cisco Drops 48 New Firewall Vulnerabilities, 2 Critical

Read Original Article
0

Comments

Want to join the conversation?

Loading comments...