{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T17:37:40.342","vulnerabilities":[{"cve":{"id":"CVE-2026-20001","sourceIdentifier":"psirt@cisco.com","published":"2026-03-04T18:16:12.243","lastModified":"2026-03-05T19:39:11.967","vulnStatus":"Awaiting Analysis","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability in the REST API of Cisco Secure FMC Software could allow an authenticated, remote attacker to conduct SQL injection attacks on an affected system.\r\n\r\nThis vulnerability is due to inadequate validation of user-supplied input. An attacker could exploit this vulnerability by sending crafted requests to an affected device. A successful exploit could allow the attacker to obtain read access to the database and read certain files on the underlying operating system. To exploit this vulnerability, the attacker would need valid user credentials with any of the following roles:\r\n\r\nAdministrator\r\nSecurity approver\r\nAccess admin\r\nNetwork admin"},{"lang":"es","value":"Una vulnerabilidad en la API REST de Cisco Secure FMC Software podría permitir a un atacante remoto autenticado realizar ataques de inyección SQL en un sistema afectado.\n\nEsta vulnerabilidad se debe a una validación inadecuada de la entrada proporcionada por el usuario. Un atacante podría explotar esta vulnerabilidad enviando solicitudes manipuladas a un dispositivo afectado. Un exploit exitoso podría permitir al atacante obtener acceso de lectura a la base de datos y leer ciertos archivos en el sistema operativo subyacente. Para explotar esta vulnerabilidad, el atacante necesitaría credenciales de usuario válidas con cualquiera de los siguientes roles:\n\nAdministrador\nAprobador de seguridad\nAdministrador de acceso\nAdministrador de red"}],"metrics":{"cvssMetricV31":[{"source":"psirt@cisco.com","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":3.6}]},"weaknesses":[{"source":"psirt@cisco.com","type":"Primary","description":[{"lang":"en","value":"CWE-89"}]}],"references":[{"url":"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-sql-injection-2qH6CcJd","source":"psirt@cisco.com"}]}}]}