Amazon Threat Intelligence has revealed that the Interlock ransomware group began exploiting a maximum-severity zero-day vulnerability (CVE-2026-20131) in Cisco Secure Firewall Management Center (FMC) software on January 26, 2026. This exploitation occurred a full 36 days before Cisco disclosed and patched the flaw on March 4, 2026. The vulnerability is a critical insecure deserialization issue with a CVSS score of 10.0, allowing a remote, unauthenticated attacker to achieve root-level remote code execution (RCE). In response to confirmed active exploitation, CISA added CVE-2026-20131 to its Known Exploited Vulnerabilities (KEV) catalog on March 19, 2026. This incident highlights the significant head start threat actors can gain by discovering and weaponizing zero-day flaws before vendors are aware of them.
CVE-2026-20131 is an insecure deserialization vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FMC) and Cisco Security Cloud Control (SCC) Firewall Management.
The flaw allows a remote, unauthenticated attacker to execute arbitrary Java code with root privileges on the affected device by sending a specially crafted serialized Java object to the management interface. Gaining root access on a central firewall management console effectively gives an attacker control over a significant portion of an organization's network security infrastructure.
The Interlock ransomware group, active since September 2024, was identified as the primary actor exploiting this zero-day. Amazon's researchers uncovered the activity after discovering a misconfigured server belonging to the gang. This provided a rare look into the group's TTPs and their exploitation timeline, which began on January 26, 2026. Cisco acknowledged the active exploitation in an updated advisory on March 18, 2026, and CISA added the flaw to its KEV catalog the following day, mandating that federal agencies patch it promptly.
The attack chain observed by Amazon researchers involved several stages:
T1190 - Exploit Public-Facing Application.T1203 - Exploitation for Client Execution).T1059.001 - PowerShell).T1059.004 - Unix Shell).T1219 - Remote Access Software), to blend in with normal administrative traffic and facilitate movement within the network. The use of the Volatility Framework suggests advanced memory forensics capabilities for credential harvesting or analyzing compromised systems.The exploitation of a CVSS 10.0 vulnerability on a network security appliance like the Cisco FMC represents a worst-case scenario. Successful exploitation grants attackers:
The Interlock group is known for targeting sectors like education, manufacturing, and healthcare, where operational downtime is highly impactful. Compromising the central security appliance allows them to maximize this disruption.
ConnectWise ScreenConnect.New details on CVE-2026-20131 exploitation by Interlock: Amazon's MadPot discovery, Cisco's initial unawareness, CISA's March 22 patch deadline, and specific detection observables.
Immediately apply the security patches provided by Cisco to remediate the vulnerability.
Mapped D3FEND Techniques:
Restrict network access to the Cisco FMC management interface, ensuring it is not exposed to the internet and is only accessible from a secure, internal management network.
Mapped D3FEND Techniques:
Use an IPS/IDS to monitor for and potentially block exploit attempts against the known vulnerability.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats