Interlock Ransomware Exploits Cisco Secure FMC Zero-Day in Attacks Since January

Related

CISOs to Watch in Georgia’s Financial Services Sector

Georgia’s financial services sector includes banks, wealth management firms,...

ScreenConnect Vulnerability Exposes Machine Keys, Enables Session Hijacking

What happened ConnectWise disclosed a critical vulnerability in its ScreenConnect...

RondoDox Botnet Targets 174 Vulnerabilities Across Devices and Platforms

What happened Researchers at Bitsight identified a large-scale campaign involving...

11 Cybersecurity Vendors CISOs Must Check Out at RSA Conference 2026

Cybersecurity has shifted from reactive defense to continuous, intelligence-driven...

Share

What happened

The Interlock ransomware group exploited a critical zero-day vulnerability in Cisco Secure Firewall Management Center (FMC) software in attacks beginning January 26, 2026, more than a month before the flaw was publicly disclosed and patched. The vulnerability, tracked as CVE-2026-20131, is a maximum-severity remote code execution issue that allows unauthenticated attackers to execute arbitrary Java code as root on affected systems. Researchers from Amazon Threat Intelligence discovered the early exploitation through honeypot data, revealing that attackers used crafted HTTP requests to trigger code execution, followed by downloading additional payloads from attacker-controlled infrastructure. Cisco released a patch on March 4, 2026, but by that time, attackers had already used the flaw to compromise enterprise firewall management systems in real-world attacks. 

Who is affected

Organizations running unpatched versions of Cisco Secure Firewall Management Center are affected, particularly enterprise environments where firewall management systems are exposed or accessible to attackers. 

Why CISOs should care

The incident highlights how ransomware groups are exploiting critical vulnerabilities in network security infrastructure, allowing attackers to gain privileged access to core systems that control and monitor enterprise networks. 

3 practical actions

  1. Apply Cisco security patches immediately. Update affected FMC systems to remediate CVE-2026-20131. 
  2. Restrict access to firewall management interfaces. Limit exposure of FMC systems to trusted networks only. 
  3. Monitor for exploitation indicators. Review logs for suspicious HTTP requests and unauthorized code execution attempts. 

For more coverage of ransomware campaigns and extortion-driven attacks, explore our reporting under the Ransomware tag.