Firewall integrations

Fortinet

Elevate the power of your Fortinet Fortigate Firewall using by adding our Intelligence.

Palo Alto

Palo Alto Firewalls can be hardened with our threat intelligence as well.

Sophos XGS

Enhance the Sophos XGS Firewall with our threat intelligence.

OPNsense

Enhance your OPNsense Firewall with our threat intelligence using the native plugin.

SIEM integrations

Splunk

Splunk is a great platform, but without the right Threat Intelligence it's just a log server. Try our threat intelligence today. 

Microsoft Sentinel

One of the most used SIEM solutions should be enriched with the right Intelligence. At Q-Feeds you're at the right place!

Other

Luckily there are many other SIEM vendors whom support 3rd party threat intelligence.

Threat Intelligence Portal

Darkweb Monitoring

Darkweb monitoring is one of our services, not only for threat intelligence but also for you most important assets.

Threat Lookup

With Threat Lookup you get full insights in our IOC database, including full MITRE ATT&K mapping.

External Attack Surface Management

A toolset to check your external facing assets exposed on the internet

Vulnerability Scanner

A comprehensive vulnerability scanner which can scan your infrastructure and web applications

Brand Protection

Protect your brand for look-a-likes and potential phishing attempts

Services

TAXII Feeds & Server Software

TAXII/STIX2.1 standard. Both in form of feeds and server software available

Implementation

Need help with implementations? No worries, we have a strong network of partners who are able to help you.

Solutions

Enrich my SIEM

Elevate the power of your SIEM solution using by adding our Intelligence.

Enrich my Firewall

Firewalls can be hardened with our threat intelligence as well.

Prevent phishing

Enhance your protection against phishing

Achieve compliancy

Achieve compliancy by correlating the best threat intelligence to your logs

Futuristic eye design with circuits and geometric shapes.

Company

About

Read here all about Q-Feeds

News and Updates

Cybersecurity news and updates about us

Publications

All of our media coverage in one place

Become a reseller

Strengthen your portfolio with our comprehensive reseller program

Partner locator

Find our certified partners here

Contact

For all your questions or inquiries

Neural network representation of a human brain

Support

My Account

Access your account and manage your licenses

Downloads & Manuals

On this page you find white papers and manuals

Knowledge base

Our knowledge base full of implementation instructions

Start for free

Start your cyber security intelligence journey here

Abstract geometric wireframe human head

Interlock’s Early Access: Exploiting Cisco FMC vulnerabilities ahead of official disclosure

Mar 22, 2026 | Threat Intelligence Research

Critical Vulnerability in Cisco Secure Firewall Exploited by Interlock Group

Recent observations indicate that the Interlock group has actively exploited the critical vulnerability CVE-2026-20131 in Cisco Secure Firewall Management Center (FMC) since January 26, 2026. This vulnerability is primarily linked to insecure Java deserialization within the FMC web interface, allowing unauthenticated remote attackers to execute arbitrary code with root privileges.

Interlock’s attack methodology consists of multi-stage intrusions, encompassing initial access, reconnaissance, payload deployment, and persistence. The group demonstrates a sophisticated approach by using both custom tools and legitimate administrative utilities, complicating detection efforts. Notably, they employ fileless web shells, enabling malicious code execution directly in memory, which prevents leaving traces on disk. The exploitation process is initiated via crafted HTTP requests targeting the FMC web interface, followed by outbound communication to attacker-controlled infrastructure, subsequently facilitating the download of additional payloads.

The group’s operational tactics reflect a structured workflow involving reconnaissance to gather network and system intelligence, maintaining long-term persistence, and utilizing evasion techniques to minimize visibility. Their exploitation of proxy-based infrastructure and anti-forensic measures allows them to obscure their activities effectively. By combining these techniques, Interlock is able to maintain access even in the absence of primary malware components.

Defensive Context
Organizations using Cisco Secure Firewall should be particularly vigilant. The exploitation of CVE-2026-20131 poses serious risks to environments with internet-facing infrastructure. Security teams in such organizations need to evaluate their exposure to this vulnerability.

Why This Matters
The risk is pronounced for enterprises relying on affected Cisco FMC versions, as successful exploitation leads to complete system compromise. Entities handling sensitive data or critical applications are at heightened risk, especially those that maintain public-facing interfaces for firewall management.

Defender Considerations
While no specific detection methods were mentioned in the article, monitoring for suspicious HTTP requests to the FMC web interface and unauthorized outbound communications may provide avenues for detection. Additionally, auditing for unauthorized installations of remote access tools, such as ConnectWise ScreenConnect, may reveal signs of compromise.

Indicators of Compromise (IOCs)

  • CVE-2026-20131
  • Suspicious HTTP requests targeting FMC endpoints
  • Serialized Java payloads in inbound requests
  • Unexpected outbound connections to unknown infrastructure
  • Evidence of log deletion or tampering activities

Overall, the Interlock group’s actions highlight the critical need for organizations using Cisco FMC to remain proactive against this and potentially other emerging threats.

Click here for the full article

Try our Intelligence today!

Streamline your security operations with a free Q-Feeds trial and see the difference.

Other articles