CISA orders feds to patch max-severity Cisco flaw by Sunday
好的,我现在需要帮用户总结这篇文章的内容,控制在100个字以内。首先,我得仔细阅读文章,抓住主要信息。 文章讲的是CISA要求联邦机构修补一个高危漏洞CVE-2026-20131,这个漏洞存在于Cisco的防火墙管理软件中。Cisco在3月4日发布了安全公告,建议尽快更新,并且没有旁路措施可用。这个漏洞允许未认证的远程攻击者执行任意Java代码,权限是root级别。漏洞原因是不安全的反序列化处理用户提供的Java字节流。 接着,文章提到亚马逊的研究人员发现这个漏洞已经被利用了,Interlock勒索软件团伙从1月底就开始利用它作为零日漏洞。CISA将这个漏洞加入已知被利用的漏洞目录,并给了联邦机构到3月22日的最后期限来修补或停用产品。 用户的要求是用中文总结,控制在100字以内,不需要特定开头。所以我要提取关键点:CISA要求修补高危漏洞CVE-2026-20131,影响Cisco防火墙管理软件,允许远程攻击者执行代码;该漏洞已被用于勒索软件攻击;修复截止日期是3月22日。 现在把这些点浓缩成一句话:CISA要求联邦机构修补Cisco防火墙管理软件中的高危漏洞CVE-2026-20131,并指出该漏洞已被用于勒索软件攻击,修复截止日期为3月22日。 检查一下字数是否在限制内,并确保信息准确无误。 </think> CISA要求联邦机构修补Cisco防火墙管理软件中的高危漏洞CVE-2026-20131,并指出该漏洞已被用于勒索软件攻击,修复截止日期为3月22日。 2026-3-20 15:17:22 Author: www.bleepingcomputer.com(查看原文) 阅读量:3 收藏

CISA orders feds to patch max severity Cisco flaw by Sunday

The Cybersecurity and Infrastructure Security Agency (CISA) has ordered federal agencies to patch a maximum-severity vulnerability, CVE-2026-20131, in Cisco Secure Firewall Management Center (FMC) by Sunday, March 22.

Cisco published a security bulletin about the flaw on March 4, urging system administrators to apply the security updates as soon as possible and warning that no workarounds are available.

The Cisco Secure Firewall Management Center (FMC) is a centralized administration system for critical Cisco network security appliances, such as firewalls, application control, intrusion prevention, URL filtering, and malware protection.

“A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FMC) Software could allow an unauthenticated, remote attacker to execute arbitrary Java code as root on an affected device,” Cisco says in the advisory.

The issue is caused by insecure deserialization of a user-supplied Java byte stream and is exploitable by sending a specially crafted serialized Java object to the web-based management interface of an affected device.

On March 18, the vendor updated its bulletin to warn of active exploitation of CVE-2026-20131 in the wild. Amazon threat intelligence researchers confirmed that threat actors are leveraging the vulnerability in attacks, noting that the Interlock ransomware gang had been exploiting it as a zero-day since the end of January.

Amazon stated that the ransomware threat actor exploited CVE-2026-20131 more than a month before the vendor published the patch.

Interlock ransomware has claimed several high-profile victims since its launch in late 2024, including DaVita, Kettering Health, the Texas Tech University System, and the city of Saint Paul, Minnesota.

The threat actor is also using the ClickFix technique for initial access, as well as custom remote access trojans and malware strains like NodeSnake and Slopoly.

CISA has added CVE-2026-20131 to its Known Exploited Vulnerabilities (KEV) catalog, marking it as “known to be used in ransomware campaigns.”

Given the severity of CVE-2026-20131 and its active exploitation status since late January 2026, CISA gave Federal Civilian Executive Branch (FCEB) agencies only until this Sunday to apply the security updates or stop using the product.

CISA’s deadline is relevant to all entities subject to the Binding Operational Directive (BOD) 22-01, but private firms, state/local governments, and all non-FCEB organizations are still recommended to consider it and act accordingly.

tines

Red Report 2026: Why Ransomware Encryption Dropped 38%

Malware is getting smarter. The Red Report 2026 reveals how new threats use math to detect sandboxes and hide in plain sight.

Download our analysis of 1.1 million malicious samples to uncover the top 10 techniques and see if your security stack is blinded.


文章来源: https://www.bleepingcomputer.com/news/security/cisa-orders-feds-to-patch-max-severity-cisco-flaw-by-sunday/
如有侵权请联系:admin#unsafe.sh