March 2026 CVE Landscape: 31 High-Impact Vulnerabilities Identified, Interlock Ransomware Group Exploits Cisco FMC Zero-Day

In March 2026, 31 high-impact vulnerabilities were identified requiring prioritization for remediation, with 29 receiving Very Critical Risk Scores. Affected vendors included Cisco, Microsoft, Google, ConnectWise, and others, with Microsoft and Apple accounting for approximately 32% of vulnerabilities. Notably, the Interlock Ransomware Group exploited CVE-2026-20131, a zero-day deserialization vulnerability in Cisco Secure Firewall Management Center, as early as January 2026 to compromise enterprise networks. The group deployed custom remote access trojans and facilitated ransomware operations through crafted HTTP requests executing arbitrary Java code as root. Additional campaigns involved the DarkSword iOS exploit kit delivering GHOSTKNIFE, GHOSTSABER, and GHOSTBLADE payloads, and the Coruna exploit kit deploying PlasmaLoader malware. Nine vulnerabilities enabled remote code execution across multiple platforms. One vulnerability dated back nine years, emphasizing continued exploitation of legacy unpatched

Pulse ID: 69de0077cbff2dc8d99b17ff
Pulse Link: https://otx.alienvault.com/pulse/69de0077cbff2dc8d99b17ff
Pulse Author: AlienVault
Created: 2026-04-14 08:53:11

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#Cisco #ConnectWise #CyberSecurity #Google #HTTP #InfoSec #Java #Malware #Microsoft #OTX #OpenThreatExchange #RAT #RansomWare #RemoteAccessTrojan #RemoteCodeExecution #Trojan #Vulnerability #Word #ZeroDay #bot #iOS #AlienVault

LevelBlue - Open Threat Exchange

Learn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

LevelBlue Open Threat Exchange

In-Memory Loader Drops ScreenConnect

In February 2026, an attack chain was discovered that utilized a fraudulent Adobe Acrobat Reader download page to deceive victims into installing ConnectWise's ScreenConnect, a legitimate remote access tool exploited for malicious purposes. The attack employs sophisticated evasion techniques including heavy obfuscation, .NET reflection for in-memory payload execution, and dynamic code construction. A VBScript loader initiates the chain by downloading and executing obfuscated PowerShell commands that compile C# code entirely in memory. The loader manipulates the Process Environment Block to masquerade as legitimate Windows processes and abuses auto-elevated COM objects to bypass User Account Control without user prompts. This multi-layered approach successfully evades signature-based defenses and hinders forensic analysis while ultimately deploying ScreenConnect for unauthorized remote access.

Pulse ID: 69d8b1848ae30fd4dab9095d
Pulse Link: https://otx.alienvault.com/pulse/69d8b1848ae30fd4dab9095d
Pulse Author: AlienVault
Created: 2026-04-10 08:15:00

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#Adobe #ConnectWise #CyberSecurity #InfoSec #NET #OTX #OpenThreatExchange #PowerShell #ScreenConnect #VBS #Windows #bot #AlienVault

LevelBlue - Open Threat Exchange

Learn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

LevelBlue Open Threat Exchange
ConnectWise alerte sur une faille de vérification de signature dans ScreenConnect exposant à l'accès non autorisé et à l'élévation de privilèges

ConnectWise avertit ses clients d'une vulnérabilité de vérification de signature cryptographique dans ScreenConnect pouvant permettre un accès non autorisé et une élévation de privilèges.

CyberVeille
ConnectWise ScreenConnect schließt kritische Zugriffslücke

In ScreenConnect von ConnectWise können Angreifer aus dem Netz eine Lücke missbrauchen, um unbefugt auf die Fernwartung zuzugreifen.

heise online
ConnectWise patches new flaw allowing ScreenConnect hijacking

ConnectWise is warning ScreenConnect customers of a cryptographic signature verification vulnerability that could lead to unauthorized access and privilege escalation.

BleepingComputer
Fernwartung ScreenConnect: Kritische Lücke ermöglicht Schadcodeausführung

In der Fernwartungssoftware Connectwise ScreenConnect können angemeldete Angreifer Schadcode einschleusen. Ein Update steht bereit.

heise online
I got #PatchMon setup in my #homelab. I can't wait until it can push updates. I really wish I could find something that had the security analytics of #Wazuh with the ability to push updates... all from one service. At my job, we use #ConnectWise. I just want a #selfhost *cough*free*cough* option.
📢 ConnectWise corrige une faille critique dans Automate exposant des communications
📝 Selon BleepingComputer, ConnectWise a diffusé une mise à jour de sécurité visant à corriger plusi...
📖 cyberveille : https://cyberveille.ch/posts/2025-10-19-connectwise-corrige-une-faille-critique-dans-automate-exposant-des-communications/
🌐 source : https://www.bleepingcomputer.com/news/security/connectwise-fixes-automate-bug-allowing-aitm-update-attacks/
#Automate #ConnectWise #Cyberveille
ConnectWise corrige une faille critique dans Automate exposant des communications

Selon BleepingComputer, ConnectWise a diffusé une mise à jour de sécurité visant à corriger plusieurs vulnérabilités dans son produit Automate, dont une classée critique. ️ ConnectWise corrige deux failles critiques dans Automate exposant les communications à l’interception L’éditeur ConnectWise a publié une mise à jour de sécurité pour son outil Automate, une plateforme de supervision et de gestion à distance (RMM) utilisée par les MSP et services informatiques d’entreprises. Deux vulnérabilités, dont une jugée critique (CVE-2025-11492, score 9.6), pouvaient permettre l’interception ou la modification de communications sensibles.

CyberVeille

Imagine a trusted IT tool letting hackers intercept crucial data and swap out updates like tampered packages. What does this mean for the safety of your systems? Dive into the story behind ConnectWise Automate’s vulnerabilities and the rising threat in RMM security.

https://thedefendopsdiaries.com/connectwise-automate-vulnerabilities-lessons-for-rmm-security-in-an-evolving-threat-landscape/

#connectwise
#rmmsecurity
#supplychainattack
#cybersecurity2025
#aitmattacks

🚨 CVE-2025-11492 (CRITICAL, CVSS 9.6): ConnectWise Automate (<2025.9) sends sensitive info in cleartext over HTTP. Patch to 2025.9+ ASAP to enforce HTTPS and block MITM risks! https://radar.offseq.com/threat/cve-2025-11492-cwe-319-cleartext-transmission-of-s-fc777e45 #OffSeq #Cybersecurity #Vulnerability #ConnectWise