Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Cisco FMC flaw was exploited by Interlock weeks before patch (CVE-2026-20131)
    Cybersecurity

    Cisco FMC flaw was exploited by Interlock weeks before patch (CVE-2026-20131)

    adminBy adminMarch 20, 2026No Comments4 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Cisco FMC flaw was exploited by Interlock weeks before patch (CVE-2026-20131)
    Share
    Facebook Twitter LinkedIn Pinterest Email

    A critical vulnerability (CVE-2026-20131) in Cisco Secure Firewall Management Center (FMC) that Cisco disclosed and patched in early March 2026 has been exploited as a zero-day by the Interlock ransomware gang, Amazon CISO and VP of Security Engineering CJ Moses revealed.

    “Our research [using Amazon’s MadPot system of honeypots] found that Interlock was exploiting this vulnerability 36 days before its public disclosure, beginning January 26, 2026,” he said on Wednesday.

    CVE-2026-20131 exploited as zero-day for weeks

    Cisco Secure Firewall Management Center is used by organizations to centrally manage Cisco Secure Firewall devices.

    CVE-2026-20131 affects the FMC web-based management interface and stems from insecure deserialization of a user-supplied Java byte stream.

    The vulnerability can be exploited by unauthenticated, remote attackers by sending a crafted serialized Java object to the management interface of a vulnerable device, and can lead to code execution and privilege escalation (to root).

    Cisco was made aware of CVE-2026-20131 after a member of its Advanced Security Initiatives Group found it during internal security testing. Unfortunately, it seems that Interlock found it before that.

    “Amazon threat intelligence identified threat activity potentially related to CVE-2026-20131 beginning January 26, 2026, predating the public disclosure. Observed activity involved HTTP requests to a specific path in the affected software,” Moses shared.

    “Request bodies contained Java code execution attempts and two embedded URLs: one used to deliver configuration data supporting the exploit, and another designed to confirm successful exploitation by causing a vulnerable target to perform an HTTP PUT request and upload a generated file.”

    Interlock’s tools revealed

    AWS researchers simulated a successful exploitation, tricking the attackers into downloading a malicious Linux executable file from a remote server. By analyzing this server, they found it was a central hub for the attackers’ tools, organized by victim, and used both to send malware to infected systems and receive data back from them.

    The malware, other stored artifacts, and the ransom note pointed to Interlock involvement.

    The researchers found:

    • A PowerShell script the group uses for enumerating and collecting information about Windows hosts present on the targeted network
    • A JavaScript remote access trojan that collects information about infected hosts (and has self-update and self-delete capabilities)
    • A Java implant that sets up redundant command-and-control communication
    • A Bash script that turns a hacked Linux server into a temporary relay server that anonymizes attacks, forwards malicious traffic, and constantly erases traces to make tracking attacker activity difficult
    • A memory-resident webshell/backdoot
    • A lightweight network beacon that confirms successful code execution or network port reachability following initial exploitation.

    Interlock also uses legitimate tools like ConnectWise ScreenConnect (for redundant remote access), Volatility (for parsing memory dumps in search for sensitive data), and Certify (for identifying vulnerable certificate templates and enrollment permissions).

    Mitigation and remediation

    AWS has shared indicators of compromise enterprise defenders can check for in their logs and has advised on immediate actions and long-term measures they should take.

    “The real story here isn’t just about one vulnerability or one ransomware group—it’s about the fundamental challenge zero-day exploits pose to every security model. When attackers exploit vulnerabilities before patches exist, even the most diligent patching programs can’t protect you in that critical window,” Moses pointed out.

    “This is precisely why defense in depth is essential—layered security controls provide protection when any single control fails or hasn’t yet been deployed. Rapid patching remains foundational in vulnerability management, but defense in depth helps organizations not to be defenseless during the window between exploit and patch.”

    Cisco updated the advisory to say they’ve been made aware of active CVE-2026-20131 exploitation, and the US Cybersecurity and Infrastructure Security Agency has ordered US federal civilian agencies to address CVE-2026-20131 by March 22, 2026.

    “If the FMC management interface does not have public internet access, the attack surface that is associated with this vulnerability is reduced,” Cisco noted in its advisory.

    CVE-2026-20131 is the third Cisco vulnerability flagged as exploited as a zero-day since the start of this year: attackers also leveraged CVE-2026-20127 (in Cisco Catalyst SD-WAN Controller), CVE-2026-20045 (in the company’s unified communications solutions), and CVE-2025-20393 (in Email Security Gateway and Secure Email and Web Manager devices).

    Subscribe to our breaking news e-mail alert to never miss out on the latest breaches, vulnerabilities and cybersecurity threats. Subscribe here!

    Cisco CVE202620131 Exploited Flaw FMC Interlock Patch weeks
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleWhat It Is & Why It Matters
    Next Article This high-end projector has a price tag that will make your eyes water
    admin
    • Website

    Related Posts

    OpenAI Widens Access to Cybersecurity Model After Anthropic’s Mythos Reveal

    April 16, 2026

    Fortinet fixes critical FortiSandbox vulnerabilities (CVE-2026-39813, CVE-2026-39808)

    April 16, 2026

    Cisco says critical Webex Services flaw requires customer action

    April 16, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    OpenAI Widens Access to Cybersecurity Model After Anthropic’s Mythos Reveal

    April 16, 2026

    Gemini blocked more than 99% of bad ads before they ran in 2025

    April 16, 2026

    I tested the Moto G Stylus 2026, and it’s finally starting to feel like an affordable alternative to the Galaxy S26 Ultra, but the price tag makes it a tougher sell

    April 16, 2026

    IBM unveils security services for thwarting agentic attacks, automating threat assessment

    April 16, 2026
    Categories
    • Blogging (63)
    • Cybersecurity (1,346)
    • Privacy & Online Earning (168)
    • SEO & Digital Marketing (826)
    • Tech Tools & Mobile / Apps (1,611)
    • WiFi / Internet & Networking (226)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    OpenAI Widens Access to Cybersecurity Model After Anthropic’s Mythos Reveal

    April 16, 2026

    Gemini blocked more than 99% of bad ads before they ran in 2025

    April 16, 2026

    I tested the Moto G Stylus 2026, and it’s finally starting to feel like an affordable alternative to the Galaxy S26 Ultra, but the price tag makes it a tougher sell

    April 16, 2026
    Most Popular
    • OpenAI Widens Access to Cybersecurity Model After Anthropic’s Mythos Reveal
    • Gemini blocked more than 99% of bad ads before they ran in 2025
    • I tested the Moto G Stylus 2026, and it’s finally starting to feel like an affordable alternative to the Galaxy S26 Ultra, but the price tag makes it a tougher sell
    • IBM unveils security services for thwarting agentic attacks, automating threat assessment
    • What Is Answer Engine Optimization? And How to Do It
    • Who goes there? Your Ring doorbell can now recognise up to 50 familiar faces, and let you know if a caller is a friend or a stranger
    • COSMIC desktop surprised me, because it’s the Linux DE I’ve been waiting for
    • Fortinet fixes critical FortiSandbox vulnerabilities (CVE-2026-39813, CVE-2026-39808)
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.