On February 12, 2026, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) added two critical vulnerabilities affecting enterprise network management products from Cisco and Ivanti to its Known Exploited Vulnerabilities (KEV) catalog. The addition signifies that both CVE-2026-20131 (Cisco Secure Firewall Management Center) and CVE-2026-1603 (Ivanti Endpoint Manager) are being actively exploited by threat actors. Under Binding Operational Directive (BOD) 22-01, Federal Civilian Executive Branch (FCEB) agencies are now mandated to patch these vulnerabilities by a set deadline. CISA strongly urges all organizations using these products to prioritize remediation to defend against active threats.
CVE-2026-20131 - Cisco Secure Firewall Management Center (FMC) Software: This is a critical deserialization of untrusted data vulnerability in the web-based management interface of the FMC software. An unauthenticated, remote attacker can exploit this flaw by sending a crafted HTTP request to an affected device. Successful exploitation allows the attacker to execute arbitrary Java code on the underlying operating system with root privileges, effectively granting them full control over the firewall management center.
CVE-2026-1603 - Ivanti Endpoint Manager (EPM): This is an authentication bypass vulnerability. While fewer public details are available, authentication bypass flaws in management products like EPM are extremely dangerous. They typically allow an attacker to circumvent login mechanisms and gain administrative access to the platform, from which they can manage and potentially deploy malicious software to all connected endpoints.
Both vulnerabilities have been added to the CISA KEV catalog, which serves as definitive confirmation of active, in-the-wild exploitation. Reports suggest that CVE-2026-20131 has been used as a zero-day in ransomware attacks. Attackers are leveraging these flaws for initial access into corporate networks, followed by lateral movement and payload deployment.
Compromise of these management platforms represents a critical security failure.
The exploitation of these products provides a direct path for attackers to achieve broad network access and control.
The most effective mitigation is to apply the security patches provided by the vendors as soon as possible.
Mapped D3FEND Techniques:
Restrict network access to the management interfaces of these devices. They should not be exposed to the internet and should only be accessible from a secure management network.
Mapped D3FEND Techniques:

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats