LIVE NEWS
  • Tehran says ‘progress’ made in talks with US
  • Google and OpenAI are making a run at Claude’s desktop moat, and Anthropic is making it easy
  • DeBriefed 17 April 2026: Fossil-fuel power slumps | ‘Super’ El Niño warning | Afghanistan’s climate struggle
  • Senior official ousted over Peter Mandelson security row to face MPs
  • Scientists say this type of olive oil could boost brain power
  • The Best Smart Home Accessories to Boost Your Curb Appeal (2026)
  • Trinidad and Tobago police uncover 56 bodies, mostly children, at cemetery | Crime News
  • The best TV antennas to buy in 2024
Prime Reports
  • Home
  • Popular Now
  • Crypto
  • Cybersecurity
  • Economy
  • Geopolitics
  • Global Markets
  • Politics
  • See More
    • Artificial Intelligence
    • Climate Risks
    • Defense
    • Healthcare Innovation
    • Science
    • Technology
    • World
Prime Reports
  • Home
  • Popular Now
  • Crypto
  • Cybersecurity
  • Economy
  • Geopolitics
  • Global Markets
  • Politics
  • Artificial Intelligence
  • Climate Risks
  • Defense
  • Healthcare Innovation
  • Science
  • Technology
  • World
Home»Cybersecurity»CISA Orders US Government to Patch Maximum Severity Cisco Flaw
Cybersecurity

CISA Orders US Government to Patch Maximum Severity Cisco Flaw

primereportsBy primereportsMarch 23, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
CISA Orders US Government to Patch Maximum Severity Cisco Flaw
Share
Facebook Twitter LinkedIn Pinterest Email


The US Cybersecurity and Infrastructure Security Agency (CISA) has told all federal civilian agencies to patch a critical remote code execution (RCE) vulnerability in a Cisco firewall product, as ransomware actors circle.

CVE-2026-20131 affects the web-based management interface of Cisco Secure Firewall Management Center (FMC). With a maximum CVSS score of 10, it could “allow an unauthenticated, remote attacker to execute arbitrary Java code as root on an affected device,” according to the vendor.

It was patched by Cisco on March 4 after reports the Interlock ransomware group had been exploiting it as a zero day for several months.

CISA added the CVE to its known exploited vulnerabilities (KEV) catalog on Thursday 19 March, giving agencies just three days to patch it or “discontinue use of the product if mitigations are unavailable.”

That’s an unusually short timeline for CISA, reflective of the urgency of the situation. The entry also has a warning note attached stating that the CVE is “known to be used in ransomware campaigns.”

Read more on Cisco zero days: Global Cyber Agencies Urge Immediate Patching of Cisco SD-WAN Zero Day.

Cisco Secure Firewall Management Center (FMC) is described by the vendor as providing an “administrative nerve center” for Cisco network security products. It delivers centralized management of firewalls, application control, intrusion prevention, URL filtering, and advanced malware protection, Cisco said.

This vulnerability is “due to insecure deserialization of a user-supplied Java byte stream,” according to the CVE Program.

“An attacker could exploit this vulnerability by sending a crafted serialized Java object to the web-based management interface of an affected device,” it explained. “A successful exploit could allow the attacker to execute arbitrary code on the device and elevate privileges to root.”

How Attackers Are Using the CVE

AWS published a detailed write up of the Interlock campaign last week, warning that it had been exploiting CVE-2026-20131 in attacks since January 26.

After gaining initial access via the bug, the attackers used a variety of post-exploitation tools and techniques for persistence. These included a PowerShell script for Windows environment enumeration, and two custom remote access trojans (RATs), written in JavaScript and Java, for persistent control.

Also spotted by AWS was a “persistent memory-resident backdoor” that intercepted HTTP requests entirely in memory to evade AV detection.

The group also covered its bases by installing legitimate remote desktop tool ConnectWise ScreenConnect as a backup entry point in case they were discovered.

Additionally, they used open source memory forensics framework Volatility for parsing memory dumps in order to access credentials stored in RAM for lateral movement and deeper compromise.

They deployed security tool Certify to identify and exploit misconfigurations in Active Directory Certificate Services (AD CS). It enables threat actors to request “authentication-capable certificates” which can be used to impersonate users, escalate privileges or maintain persistent access, AWS said.

The write up included a long list of potential defensive actions, ranging from immediate tasks to patch and identify potential compromise, to detection opportunities, and longer term defense-in-depth measures.

Although the CISA mandate only applies to federal agencies, the private sector is encouraged to follow the same guidance as best practice.

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleFederal Union Says ‘Untrained’ ICE Agents Shouldn’t Replace TSA
Next Article Stablecoins Key Role in Agentic AI, Despite Limited Adoption: Bernstein
primereports
  • Website

Related Posts

Cybersecurity

[Webinar] Eliminate Ghost Identities Before They Expose Your Enterprise Data

April 18, 2026
Cybersecurity

Tycoon 2FA Loses Phishing Kit Crown Amid Surge in Attacks

April 18, 2026
Cybersecurity

Google wipes out 602 million scam ads with Gemini on duty

April 18, 2026
Add A Comment
Leave A Reply Cancel Reply

Top Posts

Global Resources Outlook 2024 | UNEP

December 6, 20258 Views

The D Brief: DHS shutdown likely; US troops leave al-Tanf; CNO’s plea to industry; Crowded robot-boat market; And a bit more.

February 14, 20264 Views

German Chancellor Merz faces difficult mission to Israel – DW – 12/06/2025

December 6, 20254 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Latest Reviews

Subscribe to Updates

Get the latest tech news from FooBar about tech, design and biz.

PrimeReports.org
Independent global news, analysis & insights.

PrimeReports.org brings you in-depth coverage of geopolitics, markets, technology and risk – with context that helps you understand what really matters.

Editorially independent · Opinions are those of the authors and not investment advice.
Facebook X (Twitter) LinkedIn YouTube
Key Sections
  • World
  • Geopolitics
  • Popular Now
  • Artificial Intelligence
  • Cybersecurity
  • Crypto
All Categories
  • Artificial Intelligence
  • Climate Risks
  • Crypto
  • Cybersecurity
  • Defense
  • Economy
  • Geopolitics
  • Global Markets
  • Healthcare Innovation
  • Politics
  • Popular Now
  • Science
  • Technology
  • World
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms & Conditions
  • Disclaimer
  • Cookie Policy
  • DMCA / Copyright Notice
  • Editorial Policy

Sign up for Prime Reports Briefing – essential stories and analysis in your inbox.

By subscribing you agree to our Privacy Policy. You can opt out anytime.
Latest Stories
  • Tehran says ‘progress’ made in talks with US
  • Google and OpenAI are making a run at Claude’s desktop moat, and Anthropic is making it easy
  • DeBriefed 17 April 2026: Fossil-fuel power slumps | ‘Super’ El Niño warning | Afghanistan’s climate struggle
© 2026 PrimeReports.org. All rights reserved.
Privacy Terms Contact

Type above and press Enter to search. Press Esc to cancel.