Cisco firewall zero-day was used to deploy Interlock ransomware before public disclosure


A critical Cisco Secure Firewall Management Center flaw was exploited as a zero-day by the Interlock ransomware group before Cisco disclosed and patched it. Amazon threat intelligence says it observed Interlock exploiting CVE-2026-20131 starting on January 26, 2026, which was 36 days before Cisco published its advisory on March 4.

The vulnerability affects Cisco Secure Firewall Management Center, or FMC, and can let an unauthenticated remote attacker execute arbitrary Java code as root on a vulnerable device. Cisco and NVD say the issue stems from insecure deserialization in the web-based management interface.

Amazon says the campaign came into focus after researchers found a misconfigured Interlock staging server that exposed a large part of the group’s toolkit. That server gave AWS visibility into the attackers’ exploit flow, their Linux and Windows payloads, remote access tools, and parts of their evasion chain. AWS also said its own infrastructure and customer workloads were not involved in the campaign.

What happened in the Interlock campaign

According to AWS, the initial exploit activity targeted a specific HTTP path in vulnerable FMC software and included Java code execution attempts plus embedded URLs. One URL delivered configuration data for the exploit, while another confirmed successful compromise by making the target upload a generated file through an HTTP PUT request.

To push the investigation forward, AWS researchers simulated a compromised host by returning the expected PUT request and file content. That prompted the attackers to move to the next stage and send commands to fetch and execute a malicious ELF binary from a remote server. AWS says that same infrastructure hosted a broader Interlock toolkit arranged into separate paths for individual victims.

AWS attributes the operation to Interlock based on the recovered ELF binary, the ransom note, and the TOR negotiation portal, all of which matched the group’s known branding and operating pattern. The company says Interlock continues to target sectors where disruption creates pressure to pay, including education, engineering, construction, manufacturing, healthcare, and government.

Why CVE-2026-20131 is so serious

Cisco rates CVE-2026-20131 as Critical, and NVD shows a CVSS 3.1 base score of 10.0. The vulnerability requires no authentication and no user interaction, which makes exposed management interfaces especially risky. NVD also notes that the attack surface drops if the FMC management interface does not have public internet access.

The flaw exists because FMC accepted untrusted serialized Java data in a way that attackers could abuse. Cisco’s advisory describes the root cause as insecure deserialization of a user-supplied Java byte stream, which can lead to code execution as root on the device.

The attack did not stop at the firewall

AWS says Interlock used the Cisco exploit to get its foothold, then deployed a wider toolkit for persistence, reconnaissance, and remote control. Recovered artifacts included a PowerShell script for Windows environment enumeration, a JavaScript remote access trojan, a Java backdoor, a Bash script that turned Linux servers into reverse proxies with HAProxy, and a memory-resident Java webshell.

That mix matters because it shows Interlock did not treat the firewall as the final target. AWS describes a multi-stage intrusion path built to expand access, map victim environments, and maintain redundant control channels before the ransomware phase.

Cisco FMC zero-day at a glance

ItemDetails
CVECVE-2026-20131
ProductCisco Secure Firewall Management Center
ImpactUnauthenticated remote code execution as root
Root causeInsecure deserialization
SeverityCritical
CVSS 3.110.0
Public disclosureMarch 4, 2026
Reported exploitation startJanuary 26, 2026
Threat actorInterlock ransomware

The timing matters as much as the vulnerability itself. AWS says the ransomware group used the bug for more than a month before disclosure, which gave it a meaningful window to compromise organizations before defenders had a patch or a public CVE to hunt against.

What defenders should do now

  • Patch Cisco Secure Firewall Management Center immediately using Cisco’s fixed release guidance.
  • Remove or tightly restrict public access to the FMC management interface wherever possible.
  • Hunt for behavior tied to Interlock rather than relying only on file hashes, since AWS says the group customized artifacts per victim.
  • Review systems for unusual HTTP PUT activity, unexpected ELF downloads, memory-resident Java components, and post-compromise reconnaissance behavior.
  • Check AWS’s published indicators of compromise and map them against firewall, server, and proxy logs.

FAQ

What is CVE-2026-20131?

It is a critical remote code execution flaw in Cisco Secure Firewall Management Center. An unauthenticated attacker can send a crafted serialized Java object to the web interface and execute code as root.

Was this Cisco bug exploited before disclosure?

Yes. AWS says it observed Interlock exploiting the bug from January 26, 2026, before Cisco disclosed it on March 4, 2026.

Did AWS customers get hit through AWS infrastructure?

AWS says it did not observe its infrastructure or customer workloads on AWS involved in this campaign.

Why should defenders focus on behavior, not just hashes?

AWS says Interlock organized tooling in victim-specific paths and customized downloaded artifacts, which weakens simple signature-based detection. Behavioral signals and attack-chain correlations are more useful here.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages