CyberHappenings logo

Track cybersecurity events as they unfold. Sourced timelines. Filter, sort, and browse. Fast, privacy‑respecting. No invasive ads, no tracking.

Interlock ransomware leverages Cisco FMC insecure deserialization zero-day (CVE-2026-20131) for root access

First reported
Last updated
1 unique sources, 1 articles

Summary

Hide ▲

A critical insecure deserialization vulnerability in Cisco Secure Firewall Management Center (FMC) Software, tracked as CVE-2026-20131 (CVSS 10.0), is being actively exploited by the Interlock ransomware group to gain unauthenticated remote root access on unpatched systems. The flaw enables unauthenticated remote attackers to bypass authentication and execute arbitrary Java code with root privileges via crafted HTTP requests to a specific endpoint. Exploitation has been observed as a zero-day since January 26, 2026, more than a month before public disclosure and patch availability. The attack chain includes post-exploitation tooling such as custom JavaScript/Java RATs, PowerShell reconnaissance scripts, Linux reverse proxy configuration tools, memory-resident web shells, and ConnectWise ScreenConnect for persistence. Compromised environments are being leveraged for ransomware operations and secondary monetization.

Timeline

  1. 18.03.2026 18:00 1 articles · 2h ago

    Interlock ransomware exploits Cisco FMC zero-day (CVE-2026-20131) for initial access and root compromise

    Unauthenticated, remote attackers began exploiting CVE-2026-20131 in Cisco Secure Firewall Management Center (FMC) Software on or around January 26, 2026, achieving root-level code execution via insecure deserialization of user-supplied Java byte streams. The attack begins with crafted HTTP requests to a specific FMC endpoint, followed by confirmation via HTTP PUT, then retrieval of ELF binaries from remote infrastructure. The payloads include reconnaissance scripts, custom RATs, Linux reverse proxy tools, web shells, and ScreenConnect for persistence.

    Show sources

Information Snippets