HomeIntelligenceBrief
🛡️ VULNERABILITY BRIEF🔴 Critical🛡️ Vulnerability

Critical Cisco FMC Zero‑Day (CVE‑2026‑20131) Exploited by Interlock Ransomware Group 36 Days Before Disclosure

The Interlock ransomware gang has been weaponizing a critical Cisco Secure Firewall Management Center zero‑day (CVE‑2026‑20131) since late January 2026, a full 36 days before Cisco’s public advisory. The flaw enables unauthenticated remote code execution as root, exposing organizations that rely on Cisco FMC to ransomware compromise and supply‑chain risk.

🛡️ LiveThreat™ Intelligence · 📅 March 19, 2026· 📰 securityaffairs.com
🔴
Severity
Critical
🛡️
Type
Vulnerability
🎯
Confidence
High
🏢
Affected
3 sector(s)
Actions
6 recommended
📰
Source
securityaffairs.com

Critical Cisco FMC Zero‑Day (CVE‑2026‑20131) Exploited by Interlock Ransomware Group 36 Days Before Disclosure

What It Is – A remote‑code‑execution (RCE) flaw in Cisco Secure Firewall Management Center (FMC) and Cisco Security Cloud Control (SCC) allows an unauthenticated attacker to execute arbitrary Java code as root via insecure deserialization. The vulnerability is tracked as CVE‑2026‑20131 and carries a CVSS 10.0 rating.

Exploitability – The Interlock ransomware group has been weaponising this zero‑day since 26 January 2026, i.e., 36 days before Cisco’s public advisory in early March 2026. Exploits have been observed in the wild, delivering the AI‑assisted Slopoly malware and ransomware payloads.

Affected Products

  • Cisco Secure Firewall Management Center (FMC) (web‑interface)
  • Cisco Security Cloud Control (SCC) Firewall Management

TPRM Impact – Organizations that rely on Cisco FMC for network security—especially managed‑service providers, healthcare systems, and universities—face a heightened supply‑chain risk. A successful exploit can give attackers unfettered control of the firewall, enabling lateral movement, data exfiltration, and ransomware encryption across the enterprise network.

Recommended Actions

  • Deploy Cisco’s March 2026 patch for CVE‑2026‑20131 immediately.
  • If patching is delayed, disable remote web management or restrict access to trusted IP ranges.
  • Enforce multi‑factor authentication for all FMC admin accounts.
  • Apply IDS/IPS signatures that detect the crafted Java serialized object used in the exploit.
  • Monitor for known Slopoly IOCs and ransomware activity linked to Interlock.
  • Conduct a rapid audit of FMC configurations across all third‑party environments and verify segmentation of management traffic.

Source: Security Affairs – Interlock group exploiting the Cisco FMC flaw CVE‑2026‑20131 36 days before disclosure

📰 Original Source
https://securityaffairs.com/189636/malware/interlock-group-exploiting-the-cisco-fmc-flaw-cve-2026-20131-36-days-before-disclosure.html

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

🛡️

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.