Security teams and network managers have a new reason to urgently review their firewalls: the Ransomware group known as Interlock has been taking advantage of a remote code execution vulnerability (CERs) in the Cisco Secure Firewall Management Center (FMC) software before the public correction was available.
According to telemetry published by Amazon's intelligence team, the active exploitation of this decision began in late January 2026, long before Cisco made the solution public. Amazon's finding indicates that the attackers had a functional explosion at least since January 26, which gave them an advantage in compromising systems before the defenders knew exactly what to look for. The Amazon report is available for more context and technical details on your security blog: Amazon Threat Intelligence.

Cisco launched the patch on March 4, 2026 and accompanied the update with a notice describing the vulnerability listed as CVE-2026-20131. The company warned that, on unpatched devices, an unauthenticated attacker could run arbitrary Java code with root privileges through the FMC web interface. Cisco's own note with recommendations and update download is available at your security center: Cisco Security Advisory. For standard technical data and CVE monitoring, the NVD registry offers a public entry: NVD · CVE-2026-20131.
Interlock is not a minor actor: it emerged publicly in September 2024 and has been related to other previous campaigns that included the distribution of remote-access Trojans, such as NodeSnake, and attacks on UK universities. The group has attributed high-profile incidents against health and education organizations, including victims. In addition, IBM X-Force researchers have noted the emergence of a new malicious load associated with the group, nicknamed Slopoly, which possibly incorporates tools based on generative artificial intelligence to expand its attack capabilities.
The combination of a zero-day explosion and a target as sensitive as the firewall management console poses a high risk. The FMC is precisely the point from which network security policy is controlled; achieving remote execution with root privileges allows an attacker to disable rules, deploy malicious routes, or move laterally with relative freedom. It's the kind of access that turns a gap into a larger-range incident in a very short time..
Recent research also shows that Cisco has had to respond to a number of failures in productive environments over the course of the year, which highlights the pressure on both manufacturers and internal security equipment. In this scenario, the window between discovery and exploitation can be very short, and the adversaries benefit from every day that a patch is not applied in critical environments.
For infrastructure managers who manage Cisco FMC, the immediate recommendation is clear: apply the official updates provided by Cisco and follow the safety notice guides. Beyond the patch, it is appropriate to review the access to the management console, restrict its exposure to the Internet, apply network segmentation to isolate the FMC and analyze the records for suspicious activity prior to the patch. In scenarios where immediate correction is not possible, mitigating exposure and monitoring commitment signals can make a difference.

There is another strategic lesson: attackers are moving fast and, in some cases, taking advantage of capabilities expanded by automated or IA-based tools to create and adapt malware. This increases the need for in-depth defence, centralized telemetry and incident response exercises that consider the possibility of initial commitments through management systems.
Finally, the security community and suppliers must maintain a smooth communication. The case of Amazon by detecting prior exploitation and sharing this information with Cisco to accelerate the response is an example of collaboration that helps reduce impact. Coordination between detectors, suppliers and operators is now as crucial as ever..
If you manage a Cisco Secure FMC, check Cisco's notice and mitigation indications as soon as possible, and consider auditioning your environment for signs of abnormal activity on the dates before the patch is published. The official resources referred to in this article are a good starting point for rapid action: Security notice from Cisco Amazon's campaign report: Amazon Threat Intelligence and the CVE public record: NVD · CVE-2026-20131.
Related
More news on the same subject.

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

RAMPART and Clarity redefine the safety of IA agents with reproducible testing and governance from the start
Microsoft has presented two open source tools, RAMPART and Clarity, aimed at changing the way the safety of IA agents is tested: one that automates and standardizes technical te...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...

The dark matter of identity is changing the rules of corporate security
The Identity Gap: Snapshot 2026 report published by Orchid Security puts numbers to a dangerous trend: the "dark matter" of identity - accounts and credentials that are neither ...