What's Happening?
A vulnerability in Cisco's Secure Firewall Management Center (FMC) software, identified as CVE-2026-20131, has been exploited as a zero-day by the Interlock cybercrime group since late January. This vulnerability allows remote, unauthenticated attackers
to execute arbitrary Java code with root privileges. Cisco announced patches for this and other vulnerabilities on March 4, but the Interlock group had already been exploiting it. Amazon's threat intelligence team discovered the exploitation and noted that Interlock targets sectors where operational disruption pressures payment, including education, engineering, healthcare, and government entities. The group is suspected to operate in the UTC+3 time zone, possibly from Russia, Belarus, or Middle Eastern countries.
Why It's Important?
The exploitation of this vulnerability highlights the ongoing threat posed by cybercrime groups to critical sectors in the U.S., including education and healthcare. The ability to execute code with root privileges can lead to significant operational disruptions, potentially affecting sensitive data and critical infrastructure. Organizations using Cisco's FMC software must ensure their systems are patched and secure to prevent such attacks. The incident underscores the importance of robust cybersecurity measures and the need for continuous monitoring and threat intelligence to protect against sophisticated cyber threats.
What's Next?
Cisco has updated its advisory to inform customers about the in-the-wild exploitation of the vulnerability. Organizations are advised to secure their FMC management interfaces and apply the latest patches to mitigate the risk. Amazon has shared indicators of compromise to help defenders detect and block Interlock ransomware attacks. Continued vigilance and collaboration between cybersecurity firms and affected sectors are crucial to prevent further exploitation and minimize the impact of such attacks.









