Threat Advisories:
Critical Threat Research : The Iranian Cyber War Intensifies! Download the Report

CVE-2026-20131: Interlock Ransomware Exploits Critical Cisco Secure FMC Flaw

Red | Vulnerability Report
Download PDF

Summary

CVE-2026-20131 represents a critical remote code execution vulnerability affecting Cisco Secure Firewall Management Center (FMC) Software and Cisco Security Cloud Control (SCC) Firewall Management. This critical vulnerability carries a CVSS score of 10.0, enabling unauthenticated attackers to execute arbitrary Java code with root privileges through insecure deserialization in the web management interface. The Interlock ransomware group actively exploited this Cisco FMC vulnerability as a zero-day since January 26, 2026, more than a month before Cisco’s official disclosure on March 4, 2026. The Interlock ransomware campaign targets multiple sectors including education, engineering, architecture and construction, manufacturing, healthcare, and government organizations. A misconfigured Interlock infrastructure server exposed their sophisticated attack toolkit, revealing custom remote access trojans, memory-resident web shells, and infrastructure laundering capabilities specifically designed for Cisco Secure Firewall exploitation.

Vulnerability Details

Critical Remote Code Execution Flaw in Cisco Firewall Management

CVE-2026-20131 exploits a deserialization vulnerability in Cisco Secure Firewall Management Center Software, allowing remote attackers to send crafted serialized Java objects to the web-based management interface. The Cisco FMC vulnerability enables unauthenticated attackers to achieve complete system compromise by executing arbitrary Java code as root without proper validation. Cisco disclosed this critical vulnerability on March 4, 2026, alongside CVE-2026-20079, an authentication bypass vulnerability. The Cisco Secure Firewall vulnerability affects both on-premises FMC Software deployments and SaaS-delivered Cisco Security Cloud Control (SCC) Firewall Management, while ASA and FTD Software remain unaffected. No workarounds exist for this Cisco firewall security flaw, making immediate patching essential.

Interlock Ransomware Zero-Day Exploitation Campaign

Threat intelligence analysis confirmed that the Interlock ransomware group exploited CVE-2026-20131 as a zero-day vulnerability starting January 26, 2026, over a month before public disclosure. A misconfigured Interlock infrastructure server inadvertently exposed their complete attack toolkit, providing unprecedented insight into their Cisco FMC exploitation methodology. The exposed toolkit revealed a multi-stage attack chain featuring custom remote access trojans, reconnaissance scripts, infrastructure laundering mechanisms, and advanced evasion techniques. These critical findings were shared with Cisco, which subsequently confirmed active exploitation of the Cisco Secure Firewall vulnerability in the wild.

Sophisticated Multi-Stage Attack Methodology

The Interlock ransomware attack chain delivers malicious serialized Java objects to the FMC management interface via specially crafted HTTP requests. Upon successful Cisco FMC exploitation, the compromised system confirms success through an HTTP PUT request to attacker-controlled infrastructure before fetching additional payloads including ELF binaries. The Interlock toolkit includes custom JavaScript and Java RATs utilizing RC4-encrypted WebSocket connections, a memory-resident Java web shell that evades file-based detection, PowerShell reconnaissance scripts for network enumeration, and infrastructure laundering scripts that configure disposable reverse proxies with automated log erasure every five minutes. Interlock operators also abuse ConnectWise ScreenConnect for persistent remote access, Certify for AD CS exploitation, and Volatility for credential extraction from memory dumps.

Targeted Industries and Extortion Strategy

Interlock ransomware specifically targets education, engineering, architecture and construction, manufacturing, healthcare, and government sectors where operational disruption creates maximum payment pressure. Their extortion methodology combines data encryption with regulatory exposure threats, using per-victim identifiers embedded in ransom notes to track campaigns. Organizations using Cisco Secure Firewall Management Center must immediately apply Cisco security patches, review system logs for published indicators of compromise, audit environments for unauthorized ScreenConnect installations, restrict FMC management interface exposure to trusted networks, and implement comprehensive defense-in-depth strategies against Cisco firewall vulnerabilities.

Recommendations

Apply Cisco Security Patches Immediately

Organizations running Cisco Secure Firewall Management Center must immediately apply the fixed software releases provided by Cisco to remediate CVE-2026-20131. Use Cisco’s Software Checker tool to identify the appropriate fixed release for your specific Cisco FMC deployment. Cisco Security Cloud Control (SCC) Firewall Management users require no action as the SaaS offering is automatically upgraded by Cisco as part of standard maintenance. Patching this critical Cisco vulnerability represents the most effective remediation and should be treated as an emergency priority given active Interlock ransomware exploitation.

Conduct Comprehensive Compromise Assessment

Given that active Interlock ransomware exploitation has been ongoing since at least January 26, 2026, organizations must conduct thorough security assessments to determine whether their Cisco Secure Firewall environments have been compromised. Review network and system logs for the published indicators of compromise including exploit source IPs, command and control domains, and specific HTTP User-Agent strings and TLS JA3/JA4 fingerprints associated with the Interlock ransomware exploit traffic targeting Cisco FMC systems.

Audit Remote Access Tool Deployments

Review all ConnectWise ScreenConnect installations across the environment for unauthorized deployments, as the Interlock ransomware group deploys legitimate remote access tools alongside custom implants to maintain redundant access to compromised Cisco Secure Firewall systems. Any ScreenConnect instance that cannot be attributed to authorized IT operations should be investigated immediately and isolated pending forensic analysis for potential Cisco FMC compromise.

Restrict Management Interface Exposure

Ensure that the Cisco FMC web-based management interface is not directly accessible from the public internet to reduce Cisco Secure Firewall vulnerability exposure. Implement network segmentation and access control lists to restrict Cisco Firewall Management Center interface access to trusted administrative networks only. While this does not eliminate the Cisco vulnerability, it significantly reduces the attack surface available to remote Interlock ransomware adversaries.

Strengthen Defense-in-Depth Posture

Implement layered security controls to ensure that no single point of failure leaves the organization defenseless against Cisco FMC exploitation. This includes deploying network segmentation to limit lateral movement after Cisco Secure Firewall compromise, maintaining up-to-date endpoint detection and response solutions, enabling multi-factor authentication on all administrative interfaces, conducting regular vulnerability scans for Cisco firewall security flaws, and testing incident response procedures specifically for ransomware scenarios. Defense-in-depth is essential for protecting against zero-day Cisco vulnerabilities during the window between initial exploitation and patch availability.

Indicators of Compromise (IoCs)

File Hashes (SHA256):

  • d1caa376cb45b6a1eb3a45c5633c5ef75f7466b8601ed72c8022a8b3f6c1f3be
  • 6c8efbcef3af80a574cb2aa2224c145bb2e37c2f3d3f091571708288ceb22d5f

IPv4 Addresses: 206[.]251[.]239[.]164, 199[.]217[.]98[.]153, 89[.]46[.]237[.]33, 144[.]172[.]94[.]59, 199[.]217[.]99[.]121, 188[.]245[.]41[.]78, 144[.]172[.]110[.]106, 95[.]217[.]22[.]175, 37[.]27[.]244[.]222

Command and Control Domains: cherryberry[.]click, ms-server-default[.]com, initialize-configs[.]com, ms-global.first-update-server[.]com, ms-sql-auth[.]com, kolonialeru[.]com, sclair.it[.]com, browser-updater[.]com, browser-updater[.]live, os-update-server[.]com, os-update-server[.]org, os-update-server[.]live, os-update-server[.]top

Exploit TLS Fingerprints (JA4): t13i1811h1_85036bcba153_b26ce05bbdd6, t13i4311h1_c7886603b240_b26ce05bbdd6

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:136.0) Gecko/20100101 Firefox/136.0

MITRE ATT&CK TTPs

Initial Access: T1190 (Exploit Public-Facing Application)

Execution: T1059 (Command and Scripting Interpreter) – T1059.001 (PowerShell), T1059.007 (JavaScript)

Persistence: T1505 (Server Software Component) – T1505.003 (Web Shell)

Defense Evasion: T1070 (Indicator Removal) – T1070.002 (Clear Linux or Mac System Logs), T1620 (Reflective Code Loading)

Credential Access: T1649 (Steal or Forge Authentication Certificates), T1003 (OS Credential Dumping)

Discovery: T1082 (System Information Discovery), T1083 (File and Directory Discovery), T1049 (System Network Connections Discovery)

Collection: T1560 (Archive Collected Data) – T1560.001 (Archive via Utility)

Command and Control: T1071 (Application Layer Protocol) – T1071.001 (Web Protocols), T1090 (Proxy) – T1090.002 (External Proxy), T1572 (Protocol Tunneling), T1219 (Remote Access Tools) – T1219.002 (Remote Desktop Software)

Impact: T1486 (Data Encrypted for Impact), T1657 (Financial Theft)

References

  • Cisco Security Advisory: CVE-2026-20131 FMC RCE
  • Cisco Security Advisory: CVE-2026-20079 Authentication Bypass
  • Amazon Threat Intelligence: Interlock Ransomware Campaign Analysis
  • HivePro Threat Advisory: Interlock Ransomware Operations

What’s new on HivePro

Get through updates and upcoming events, and more directly in your inbox