On February 12, 2026, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) added two critical vulnerabilities affecting enterprise network management products from Cisco and Ivanti to its Known Exploited Vulnerabilities (KEV) catalog. The addition signifies that both CVE-2026-20131 (Cisco Secure Firewall Management Center) and CVE-2026-1603 (Ivanti Endpoint Manager) are being actively exploited by threat actors. Under Binding Operational Directive (BOD) 22-01, Federal Civilian Executive Branch (FCEB) agencies are now mandated to patch these vulnerabilities by a set deadline. CISA strongly urges all organizations using these products to prioritize remediation to defend against active threats.
CVE-2026-20131 - Cisco Secure Firewall Management Center (FMC) Software: This is a critical deserialization of untrusted data vulnerability in the web-based management interface of the FMC software. An unauthenticated, remote attacker can exploit this flaw by sending a crafted HTTP request to an affected device. Successful exploitation allows the attacker to execute arbitrary Java code on the underlying operating system with root privileges, effectively granting them full control over the firewall management center.
CVE-2026-1603 - Ivanti Endpoint Manager (EPM): This is an authentication bypass vulnerability. While fewer public details are available, authentication bypass flaws in management products like EPM are extremely dangerous. They typically allow an attacker to circumvent login mechanisms and gain administrative access to the platform, from which they can manage and potentially deploy malicious software to all connected endpoints.
Both vulnerabilities have been added to the CISA KEV catalog, which serves as definitive confirmation of active, in-the-wild exploitation. Reports suggest that CVE-2026-20131 has been used as a zero-day in ransomware attacks. Attackers are leveraging these flaws for initial access into corporate networks, followed by lateral movement and payload deployment.
Compromise of these management platforms represents a critical security failure.
The exploitation of these products provides a direct path for attackers to achieve broad network access and control.
Cisco FMC flaw (CVE-2026-20131) confirmed CVSS 10.0, exploited by Interlock ransomware since Jan 2026 as zero-day. Cisco released advisory March 4.
The most effective mitigation is to apply the security patches provided by the vendors as soon as possible.
Mapped D3FEND Techniques:
Restrict network access to the management interfaces of these devices. They should not be exposed to the internet and should only be accessible from a secure management network.
Mapped D3FEND Techniques:
CISA adds CVE-2026-20131 and CVE-2026-1603 to its KEV catalog.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.