Editorial coverage · CVE-2026-20131
Two CVEs from one advisory, two version floors. Your change record has one field.
The deserialization RCE half of cisco-sa-fmc-rce-NKhnULJh. CVSS 10.0, Scope:Changed, root on the console that defines the perimeter. The auth-bypass companion CVE-2026-20079 shipped the same day in the same advisory against the same surface, with overlapping but non-identical fix versions per branch. On 7.4.x specifically, 7.4.4 closes the auth bypass and the deserialization floor is 7.4.6. The advisory states the version split clearly. The change-record schema does not have a column for it, the scanner reports one CVE-to-version lookup at a time, and the KEV deadline writes one row.
What we say
Most vendor advisories ship one CVE per row in the operator’s head and one CVE per row in the operator’s tooling, and those two rows agree. cisco-sa-fmc-rce-NKhnULJh ships two. The deserialization RCE (CVE-2026-20131, CVSS 10.0, Scope:Changed) and the authentication bypass (CVE-2026-20079, CVSS 10.0) landed in the same advisory on March 4, 2026, against the same management interface. Five of the six remediation branches close both CVEs at the same minimum version. The 7.4.x branch does not. 7.4.4 closes the auth bypass. 7.4.6 is the floor for the deserialization RCE.
The advisory states this. The change record does not have a field for it. The standard advisory-to-ticket workflow opens one ticket per advisory and writes one target version per branch. A team that writes 7.4.6 (the higher of the two floors) into the ticket closes cleanly against both CVEs. A team that writes 7.4.4 (the version the auth-bypass scanner returned first, the version the release-notes summary surfaced) closes the ticket against CVE-2026-20079 and leaves CVE-2026-20131 open underneath a closed ticket. The scanner that re-runs after the upgrade reports the deserialization RCE as still vulnerable. Whether that signal reaches the same change record depends on the team’s tooling integration, and most integrations are one-CVE-per-row.
The KEV listing compounds the schema problem. CISA added CVE-2026-20131 to the catalog on March 19 with a three-day federal due date against a class of equipment whose structural minimum is the HA-pair coordination, the pre-upgrade snapshot, the optional multi-hop intermediate release on older branches, and the post-upgrade policy redeploy. The three-day deadline is honest about adversary tempo: a 36-day zero-day window before patch, a public PoC on GitHub one week after fix, Interlock ransomware activity through the window. The deadline is not honest about the version-floor split. An FCEB operator on a 7.4.x branch who patches to 7.4.4 within three days clears the BOD 22-01 row against the catalog and misses the actual remediation against the actual CVE the catalog row names.
The advisory’s own structure makes the disjunction visible to a reader willing to do the cross-reference. The per-CVE fixed-version table is in the document. The release notes for 7.4.4 mention the auth bypass and not the RCE. The operator with time to read both is fine. The operator working from a vulnerability-management tool that imported the advisory as one entry and surfaced the lower of the two version numbers as “the fix” is not. The failure mode is not a vendor failure. It is a schema failure between three layers (advisory text, change record, scanner output) that all model the same advisory and disagree about what “fixed” means on the 7.4.x branch.
The narrow remediation question has one answer: on the 7.4.x branch, patch to 7.4.6 minimum, not 7.4.4. The reconciliation question is wider. Cisco’s monthly-style advisory model has lived in this state on other product lines for years. Microsoft’s cumulative-update model at least collapses the disjunction into one rollup version that closes everything in the bundle. The Cisco FMC model on this advisory is one document, two CVEs, two floors on one branch. The audit narrative has one field per host. Until the tooling chain grows the second field, the reconciliation has to live in the workflow that imports the advisory. The fastest reliable rule is the one this editorial corpus keeps arriving at from different angles: read the advisory, not the row the tool surfaced from it.
What NVD says
CWE-502 — deserialization of untrusted data. NVD CVSS 3.1 base 10.0, vector AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H. The score is honest about the bug. Unauthenticated Java deserialization in the Cisco Secure Firewall Management Center web management interface, root on the appliance, Scope:Changed because the appliance owns policy push to every managed FTD device in the estate. What 10.0 does not encode is that the parent advisory carries a companion CVE-2026-20079 against the same management interface, scored 10.0 in its own right (CWE-287 authentication bypass), with a different minimum-fix version on five of six remediation branches and an identical floor on one. NVD scores CVEs in isolation. The operator reading the advisory is reading one document with two CVE rows. The reconciliation between the two readings happens in the operator's head, or it does not happen.
What the vendor says
Cisco Security Advisory cisco-sa-fmc-rce-NKhnULJh, published March 4, 2026, names both CVEs together and lists no workarounds. Minimum fix versions per branch: 7.0.9, 7.2.11, 7.4.6, 7.6.5, 7.7.12, 10.0.1. Cisco Security Cloud Control deployments were auto-patched; on-prem FMC is operator-managed. The advisory is explicit about a 7.4.x split: 7.4.4 closes CVE-2026-20079, not CVE-2026-20131; 7.4.6 closes both. The text is clear. The structure that carries the text into the operator's change record is not. The standard advisory-to-ticket workflow opens one ticket per advisory and writes one target version per branch; a team that takes the version the auth-bypass scanner returned first and writes 7.4.4 into the ticket closes against CVE-2026-20079 cleanly and leaves CVE-2026-20131 open under a closed ticket. The advisory does not name that failure mode and the vendor's release notes do not flag the disjunction in a way the change-record schema reads as load-bearing.
Compliance impact
- PCI DSS
- Requirement 1 scopes the entire CDE against the firewall policy FMC defines; a rooted FMC is, by Requirement 1's own logic, a CDE-wide finding rather than a single-appliance finding. Requirement 6.3.3's one-month patch clock for critical security patches is the field most operators audit against. The QSA reading the cisco-sa-fmc-rce-NKhnULJh advisory verbatim sees two CVE entries and two version floors on the 7.4.x branch. The change record that says 'patched to 7.4.4 in March 2026' reads as on-time against the advisory date and as compliant against the audit form. It reads as still vulnerable against CVE-2026-20131 if the assessor cross-checks the version against the per-CVE table. The compliance question is not whether the operator hit the one-month clock. It is whether the audit narrative encodes the version split or assumes one fix-version-per-advisory.
- FEDRAMP
- BOD 22-01 writes one row per KEV entry and reads one version per host. CISA added CVE-2026-20131 to the catalog on March 19, 2026 with a three-day federal due date (March 22), reflecting the 36-day zero-day window and the public PoC that landed one week after Cisco's fix. The deadline is honest about adversary tempo. It is silent about the version-floor disjunction the advisory describes: a FCEB operator on a 7.4.x FMC who patches to 7.4.4 within the three-day window clears CVE-2026-20079 (the companion auth bypass) and remains exposed on CVE-2026-20131, against a catalog row whose closure the agency POA&M will record as complete. The SI-2 narrative cannot be 'we patched to the version the ticket named' when the ticket named the lower of two floors on the same branch. The 800-53 CM-3 authorization step is supposed to catch this, and in practice catches whatever the ticket carries.
Sources
- NVD — CVE-2026-20131
- NVD — CVE-2026-20079 (advisory companion)
- Cisco Security Advisory — cisco-sa-fmc-rce-NKhnULJh
- CISA Known Exploited Vulnerabilities Catalog
Every source on this list has been read by the editorial team. We do not cite something we have not opened.
Deeper read
Coverage in PatchDay Alert
One email, every weekday morning.
You're in. Check your inbox.