Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

429+ Articles
114+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. News
  3. Interlock Ransomware Exploited Cisco FMC Zero-Day for 36 Days Before Disclosure
Interlock Ransomware Exploited Cisco FMC Zero-Day for 36 Days Before Disclosure
NEWS

Interlock Ransomware Exploited Cisco FMC Zero-Day for 36 Days Before Disclosure

CVE-2026-20131, a maximum-severity CVSS 10.0 insecure deserialization flaw in Cisco Firepower Management Center, was exploited by Interlock ransomware as...

Dylan H.

News Desk

March 21, 2026
4 min read

Cisco Firewall Zero-Day Weaponized by Interlock Ransomware Since January

Amazon threat intelligence teams have identified a sophisticated ransomware campaign by the Interlock group that exploited a maximum-severity zero-day vulnerability in Cisco Firepower Management Center (FMC) for 36 days before Cisco publicly disclosed and patched the flaw. Tracked as CVE-2026-20131 with a CVSS score of 10.0, the vulnerability allows unauthenticated remote attackers to bypass authentication and execute arbitrary Java code as root.


AttributeValue
CVECVE-2026-20131
CVSS Score10.0 (Maximum Severity)
TypeInsecure Deserialization → Authentication Bypass → RCE as Root
Affected ProductCisco Firepower Management Center (FMC)
Zero-Day Exploitation StartJanuary 26, 2026
Vendor DisclosureMarch 4, 2026
Exploitation Window36+ days before patch
Threat ActorInterlock Ransomware Group
Suspected Time ZoneUTC+3

How the Attack Works

The attack chain begins with crafted HTTP requests sent to a specific path in the FMC software, exploiting an insecure deserialization vulnerability in user-supplied Java byte streams. This allows the attacker to:

  1. Bypass authentication entirely — no credentials required
  2. Execute arbitrary Java code as root on the FMC appliance
  3. Issue an HTTP PUT request to an external server to confirm successful exploitation
  4. Fetch an ELF binary from a remote server hosting additional Interlock tools

Post-Exploitation and Ransomware Deployment

Once inside, Interlock operators deploy ScreenConnect for persistent remote access and leverage the compromised firewall management console to move laterally across the victim's network. The group has claimed responsibility for attacks on DaVita, Kettering Health, the Texas Tech University System, and the city of Saint Paul, Minnesota.

Impact AreaDescription
Network Perimeter BreachFirewall management consoles provide direct access to network infrastructure
Root-Level AccessFull control of the FMC appliance, including firewall rules and configurations
Lateral MovementScreenConnect deployments enable persistent access across the network
Ransomware DeploymentFull encryption and data exfiltration following initial compromise
Healthcare TargetingDaVita and Kettering Health among confirmed victims

Recommendations

For Cisco FMC Operators

  • Apply Cisco's patch immediately — the vulnerability has been actively exploited since January
  • Conduct a forensic review of FMC access logs from January 26 onward
  • Review ScreenConnect deployments for unauthorized installations
  • Audit firewall rule changes for unauthorized modifications

For Security Teams

  • Implement defense-in-depth strategies — do not rely solely on perimeter firewalls
  • Monitor for unusual outbound HTTP PUT requests from FMC appliances
  • Restrict management interface access to trusted networks only
  • Enable MFA on all firewall management consoles

Key Takeaways

  1. CVE-2026-20131 is a CVSS 10.0 insecure deserialization flaw in Cisco FMC allowing unauthenticated root-level RCE
  2. Interlock ransomware exploited it as a zero-day for 36 days before Cisco's March 4 disclosure
  3. Amazon threat intelligence first identified the campaign targeting enterprise firewalls
  4. Confirmed victims include healthcare organizations and government entities
  5. Post-exploitation involves ScreenConnect deployment for persistent access
  6. Organizations should patch immediately and audit FMC logs back to January 26, 2026

Sources

  • Interlock Ransomware Exploits Cisco FMC Zero-Day CVE-2026-20131 for Root Access — The Hacker News
  • Amazon Threat Intelligence Teams Identify Interlock Ransomware Campaign — AWS
  • Interlock Ransomware Exploited Cisco FMC Flaw in Zero-Day Attacks Since January — BleepingComputer
  • Cisco Firewall Vulnerability Exploited as Zero-Day in Interlock Ransomware Attacks — SecurityWeek
  • Interlock Group Exploiting Cisco FMC Flaw 36 Days Before Disclosure — Security Affairs
#Zero-Day#Ransomware#Cisco#CVE#Vulnerability

Related Articles

Interlock Ransomware Has Been Exploiting Cisco FMC Zero-Day CVE-2026-20131 Since January

The Interlock ransomware gang has been actively exploiting a CVSS 10.0 insecure deserialization flaw in Cisco Secure Firewall Management Center since late...

7 min read

CISA Adds Zimbra XSS and SharePoint RCE to KEV; Cisco FMC Zero-Day Tied to Ransomware

CISA added actively exploited Zimbra Collaboration Suite and Microsoft SharePoint vulnerabilities to its Known Exploited Vulnerabilities catalog on March...

7 min read

Critical Langflow RCE Flaw Exploited Within 20 Hours of Disclosure

CVE-2026-33017, a CVSS 9.3 unauthenticated remote code execution vulnerability in the Langflow AI platform, was weaponized by threat actors within 20...

3 min read
Back to all News