Connect with us
Cisco zero-day ransomware

Security

Interlock Ransomware Uses Cisco Zero-Day for Root Access

Interlock Ransomware Uses Cisco Zero-Day for Root Access

A major cybersecurity firm is warning of an active ransomware campaign that is exploiting a critical, recently disclosed vulnerability in Cisco‘s widely used firewall management software. The campaign, attributed to the Interlock ransomware group, leverages the flaw to gain complete administrative control over affected systems.

The vulnerability, tracked as CVE-2026-20131, carries the maximum severity rating of 10.0 on the Common Vulnerability Scoring System (CVSS). It exists in the Cisco Secure Firewall Management Center (FMC) Software. According to Cisco’s advisory, the flaw is an instance of insecure deserialization of user-supplied Java byte streams.

This technical weakness allows an unauthenticated, remote attacker to execute arbitrary commands on the underlying operating system with root-level privileges. In practice, this means an attacker can take full control of the firewall management server without needing any login credentials.

Implications of the Attack

Compromising a Firewall Management Center is a high-value target for threat actors. The FMC is a central console used to configure, manage, and monitor an organization’s entire fleet of Cisco firewalls. Gaining root access to this system provides attackers with a powerful foothold within a corporate network.

From this position, attackers can disable security policies, create new rules to allow malicious traffic, and potentially move laterally to other critical systems. In the current campaign, this access is being used to deploy Interlock ransomware, which encrypts files and demands payment for their decryption.

Cisco’s Response and Mitigation

Cisco has released software updates that address this vulnerability. The company states there are no workarounds that mitigate this specific flaw. Organizations are urged to apply the relevant patches immediately.

The company’s security advisory lists affected software versions and provides direct links to the necessary updates. Cisco has confirmed it is aware of attempted exploitation of CVE-2026-20131 in the wild, corroborating the threat intelligence reports.

Background on the Vulnerability

Insecure deserialization is a common software vulnerability class where untrusted data is improperly converted into an object or data structure that a program can use. When this process is not secured, it can be manipulated to execute malicious code.

The critical nature of the flaw, combined with the lack of required authentication, makes it particularly dangerous. Security researchers often refer to such vulnerabilities as “wormable,” meaning they could potentially be used to create self-propagating malware.

Organizations that use Cisco Secure Firewall products should immediately consult the official advisory to determine if their management center is vulnerable. The advisory includes detailed instructions for upgrading to a fixed version.

Looking Ahead

Security analysts expect attempted exploitation of this vulnerability to increase in the coming days and weeks. The public disclosure of technical details, combined with proof-of-concept exploit code that often follows, typically leads to wider adoption by cybercriminal groups.

Cisco’s Product Security Incident Response Team (PSIRT) continues to monitor the situation. Further guidance for customers is likely if the threat landscape evolves. Organizations are advised to maintain vigilant network monitoring for any unusual activity originating from or targeting their firewall management systems.

Source: Amazon Threat Intelligence, Cisco Security Advisory

More in Security