{ "dataType": "CVE_RECORD", "dataVersion": "5.2", "cveMetadata": { "cveId": "CVE-2026-20016", "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "state": "PUBLISHED", "assignerShortName": "cisco", "dateReserved": "2025-10-08T11:59:15.351Z", "datePublished": "2026-03-04T18:34:22.075Z", "dateUpdated": "2026-03-05T04:55:50.590Z" }, "containers": { "cna": { "providerMetadata": { "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco", "dateUpdated": "2026-03-04T18:34:22.075Z" }, "descriptions": [ { "lang": "en", "value": "A vulnerability in the Cisco FXOS Software CLI feature for Cisco Secure Firewall ASA Software and Secure FTD Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system with root-level privileges. To exploit this vulnerability, the attacker must have valid administrative credentials on an affected device.\r\n\r This vulnerability is due to insufficient input validation of user-supplied command arguments. An attacker could exploit this vulnerability by submitting crafted input for specific CLI commands. A successful exploit could allow the attacker to execute commands on the underlying operating system with root-level privileges." } ], "affected": [ { "vendor": "Cisco", "product": "Cisco Secure Firewall Threat Defense (FTD) Software", "versions": [ { "version": "7.0.0", "status": "affected" }, { "version": "7.0.0.1", "status": "affected" }, { "version": "7.0.1", "status": "affected" }, { "version": "7.0.1.1", "status": "affected" }, { "version": "7.0.2", "status": "affected" }, { "version": "7.0.2.1", "status": "affected" }, { "version": "7.0.3", "status": "affected" }, { "version": "7.0.4", "status": "affected" }, { "version": "7.0.5", "status": "affected" }, { "version": "7.0.6", "status": "affected" }, { "version": "7.0.6.1", "status": "affected" }, { "version": "7.0.6.2", "status": "affected" }, { "version": "7.0.6.3", "status": "affected" }, { "version": "7.0.7", "status": "affected" }, { "version": "7.0.8", "status": "affected" }, { "version": "7.0.8.1", "status": "affected" }, { "version": "7.1.0", "status": "affected" }, { "version": "7.1.0.1", "status": "affected" }, { "version": "7.1.0.3", "status": "affected" }, { "version": "7.2.0", "status": "affected" }, { "version": "7.2.0.1", "status": "affected" }, { "version": "7.2.1", "status": "affected" }, { "version": "7.2.2", "status": "affected" }, { "version": "7.2.3", "status": "affected" }, { "version": "7.2.4", "status": "affected" }, { "version": "7.2.4.1", "status": "affected" }, { "version": "7.2.5", "status": "affected" }, { "version": "7.2.5.1", "status": "affected" }, { "version": "7.2.6", "status": "affected" }, { "version": "7.2.7", "status": "affected" }, { "version": "7.2.5.2", "status": "affected" }, { "version": "7.2.8", "status": "affected" }, { "version": "7.2.8.1", "status": "affected" }, { "version": "7.2.9", "status": "affected" }, { "version": "7.2.10", "status": "affected" }, { "version": "7.2.10.2", "status": "affected" }, { "version": "7.3.0", "status": "affected" }, { "version": "7.3.1", "status": "affected" }, { "version": "7.3.1.1", "status": "affected" }, { "version": "7.3.1.2", "status": "affected" }, { "version": "7.4.1", "status": "affected" }, { "version": "7.4.1.1", "status": "affected" }, { "version": "7.4.2", "status": "affected" }, { "version": "7.4.2.1", "status": "affected" }, { "version": "7.4.2.2", "status": "affected" }, { "version": "7.4.2.3", "status": "affected" }, { "version": "7.4.2.4", "status": "affected" }, { "version": "7.4.3", "status": "affected" }, { "version": "7.6.0", "status": "affected" }, { "version": "7.6.1", "status": "affected" }, { "version": "7.6.2", "status": "affected" }, { "version": "7.6.2.1", "status": "affected" }, { "version": "7.7.0", "status": "affected" }, { "version": "7.7.10", "status": "affected" }, { "version": "7.7.10.1", "status": "affected" } ] } ], "problemTypes": [ { "descriptions": [ { "lang": "en", "description": "Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')", "type": "cwe", "cweId": "CWE-88" } ] } ], "references": [ { "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-cmd-inj-mTzGZexf", "name": "cisco-sa-ftd-cmd-inj-mTzGZexf" } ], "metrics": [ { "format": "cvssV3_1", "cvssV3_1": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", "baseScore": 6, "baseSeverity": "MEDIUM", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "NONE" } } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory." } ], "source": { "advisory": "cisco-sa-ftd-cmd-inj-mTzGZexf", "discovery": "INTERNAL", "defects": [ "CSCwo73885" ] } }, "adp": [ { "metrics": [ { "other": { "type": "ssvc", "content": { "timestamp": "2026-03-04T00:00:00+00:00", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "version": "2.0.3", "id": "CVE-2026-20016" } } } ], "title": "CISA ADP Vulnrichment", "providerMetadata": { "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2026-03-05T04:55:50.590Z" } } ] } }