CVE-2026-20131 — Cisco Secure Firewall Management Center (FMC): Cisco Secure Firewall Management Center (FMC) Software and Cisco Security Cloud Control (SCC) Firewall Management Deserialization of Untrusted Data Vulnerability
CVE-2026-20131 — Cisco Secure Firewall Management Center (FMC) Software and Cisco Security Cloud Control (SCC) Firewall Management contain a deserialization of untrusted data vulnerability in the web-based management interface that could allow an unauthenticated, remote attacker to execute arbitrary
What This Means For You
- CISA has confirmed active exploitation — immediate patching required.
- Known ransomware campaign usage — elevated risk for all organizations.
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-20131 | Deserialization | Cisco Secure Firewall Management Center (FMC) Software, Cisco Security Cloud Control (SCC) Firewall Management, web-based management interface, deserialization of untrusted data vulnerability |
| CVE-2026-20131 | RCE | Cisco Secure Firewall Management Center (FMC) Software, Cisco Security Cloud Control (SCC) Firewall Management, web-based management interface, allows unauthenticated, remote attacker to execute arbitrary Java code as root |
🔎
Turn this CVE into SIEM detection coverage
Generate detection rules for Splunk, Sentinel, QRadar & Elastic — straight from this vulnerability. Use /detect in the Intel Bot.
Open Intel Bot →
Source & Attribution
| Source Platform | CISA |
| Channel | CISA KEV |
| Published | March 19, 2026 at 14:00 UTC |
This content was curated and summarized by Shimi's Cyber World for informational purposes. It is not copied or republished in full. All intellectual property rights remain with the original author and source.
Believe this infringes your rights? Submit a takedown request.