What's Happening?
A vulnerability in Cisco's Secure Firewall Management Center (FMC) software, identified as CVE-2026-20131, has been exploited as a zero-day by the Interlock cybercrime group since late January. This vulnerability allows remote, unauthenticated attackers
to execute arbitrary Java code with root privileges. Cisco released patches for this and other vulnerabilities on March 4, but the exploitation had already been occurring. Amazon's threat intelligence team discovered the exploitation and noted that the Interlock group targets sectors where operational disruption pressures payment, including education, engineering, healthcare, and government entities. The group is suspected to operate in the UTC+3 time zone, possibly from Russia.
Why It's Important?
The exploitation of this vulnerability highlights the critical need for timely patch management and robust security measures in network security devices. Organizations across various sectors, including education and healthcare, are at risk of operational disruptions that could lead to financial losses and compromised data. The incident underscores the importance of cybersecurity vigilance and the potential consequences of delayed patching. As cyber threats evolve, companies must prioritize security updates and invest in threat detection and response capabilities to mitigate risks.
What's Next?
Cisco has updated its advisory to inform customers about the ongoing exploitation and has shared indicators of compromise to help detect and block attacks. Organizations using Cisco's FMC software should ensure their systems are patched and consider additional security measures to protect against similar threats. The cybersecurity community may see increased collaboration to address vulnerabilities and improve defenses against sophisticated cybercrime groups like Interlock.









