Homepage
/
Insights
/
Critical Cisco FMC Vulnerability — CVE-2026-20131: Unauthenticated RCE Actively Exploited by Interlock Ransomware
Mar 20, 2026

Critical Cisco FMC Vulnerability — CVE-2026-20131: Unauthenticated RCE Actively Exploited by Interlock Ransomware

A critical zero-day vulnerability in Cisco's Firewall Management Center gave the Interlock ransomware group unauthenticated root-level access to enterprise networks for 36 days before a patch existed. This post covers the full technical breakdown of CVE-2026-20131, confirmed indicators of compromise, and the exact steps your team needs to take right now.

Executive Summary

CVE-2026-20131 — Executive Summary
The Situation
A critical zero-day vulnerability (CVE-2026-20131) in Cisco's on-premise Secure Firewall Management Center (FMC) has been actively exploited in the wild since January 26, 2026 — a full 36 days before Cisco released an official patch.
The Threat
With a perfect CVSS 10.0 score, this Insecure Deserialization flaw allows fully unauthenticated attackers to gain root-level access and execute fileless, in-memory Java code — leaving no trace on disk and defeating most traditional AV/EDR solutions.
Immediate Risk
The Interlock Ransomware Group leveraged this 36-DAY ZERO-DAY window to silently bypass network perimeters, deploy redundant persistent backdoors, and stage ransomware operations — before any patch or public warning existed.

Technical Analysis & Threat Landscape

The Vulnerability: Insecure Deserialization → Unauthenticated RCE

The root cause of CVE-2026-20131 is a classic — yet devastatingly impactful — Insecure Deserialization flaw in the Java-based processing pipeline of the FMC's web management interface.

When the FMC receives certain HTTP requests, it deserialises a Java byte stream to reconstruct an object server-side. The vulnerability exists because no integrity validation or type-checking is performed on the incoming byte stream before it is deserialised. An attacker can craft a malicious serialised Java object (a "gadget chain") that, upon deserialisation by the server, triggers arbitrary code execution within the JVM process context.

Key Technical Characteristics

CVE-2026-20131 — Technical Characteristics
AttributeValue
NetworkAttack Vector
Network-accessible — no adjacent network position required
AuthAuthentication Required
None — fully unauthenticated exploitation
PrivEscPrivileges Gained
Root-level process execution
ExecExecution Method
Fileless, in-memory Java code — payload never touches disk, defeating most AV/EDR solutions
TriggerTrigger Point
Specially crafted HTTP PUT request to the FMC web-based management API endpoint
CVSSCVSS Score
10.0 Critical — v3.1 & v4.0 (maximum possible score)

The fileless execution technique is particularly noteworthy. By executing the malicious Java payload entirely within JVM memory, the threat actor bypasses file-system-based detection, making this one of the more forensically evasive exploitation patterns observed in network infrastructure attacks to date.

Real-World Exploitation: Interlock Ransomware Group

The Interlock Ransomware Group — a financially motivated threat actor known for targeting critical infrastructure and enterprise network perimeters — has been confirmed as the primary exploiter of CVE-2026-20131 during its zero-day window.

Observed Attack Chain (TTPs)

CVE-2026-20131 — Technical Characteristics
AttributeValue
NetworkAttack Vector
Network-accessible — no adjacent network position required
AuthAuthentication Required
None — fully unauthenticated exploitation
PrivEscPrivileges Gained
Root-level process execution
ExecExecution Method
Fileless, in-memory Java code — payload never touches disk, defeating most AV/EDR solutions
TriggerTrigger Point
Specially crafted HTTP PUT request to the FMC web-based management API endpoint
CVSSCVSS Score
10.0 Critical — v3.1 & v4.0 (maximum possible score)

The use of ConnectWise ScreenConnect as a persistence mechanism is a hallmark of sophisticated threat actors blending into legitimate administrative traffic. Its presence on a Cisco FMC device — which has no operational reason to run remote desktop software — is an unambiguous indicator of compromise.

Amazon Threat Intelligence identified this activity using the MadPot global sensor network — a honeypot infrastructure that detected Interlock's exploitation beginning January 26, 2026, predating the public disclosure by 36 days. A misconfigured staging server exposed Interlock's full operational toolkit, giving analysts rare visibility into their complete attack chain, custom RATs, reconnaissance scripts, and evasion methods.

Technical Indicators & Proof-of-Concept (PoC)

Confirmed Indicators of Compromise (IoCs)

CVE-2026-20131 — Indicators of Compromise
TypeIndicatorValue
▸ Exploit Source IPs — Actively sending deserialization payloads to FMC
IP Exploit SourceActive January 2026 — first observed exploit wave
206.251.239[.]164
IP Exploit SourceActive March 2026 — post-disclosure exploitation
199.217.98[.]153
IP Exploit SourceActive March 2026 — post-disclosure exploitation
89.46.237[.]33
▸ Command & Control (C2) Infrastructure — Fallback and backend servers
IP C2 Fallback IPRAT reconnection fallback server — March 2026
144.172.94[.]59
IP C2 Fallback IPRAT reconnection fallback server — March 2026
199.217.99[.]121
IP C2 Fallback IPRAT reconnection fallback server — March 2026
188.245.41[.]78
IP Backend C2 IPPrimary C2 backend receiving exfiltrated data — March 2026
144.172.110[.]106
IP Backend C2 IPPrimary C2 backend receiving exfiltrated data — March 2026
95.217.22[.]175
IP Staging Host IPToolkit staging server exposed due to misconfiguration — March 2026
37.27.244[.]222
▸ Exploit Support Domains — Configuration delivery and exploitation staging
Domain Exploit Support DomainFirst observed January 2026 — initial zero-day wave
cherryberry[.]click
Domain Exploit Support DomainMarch 2026 — masquerading as Microsoft infrastructure
ms-server-default[.]com
Domain Exploit Support DomainMarch 2026 — delivers exploit configuration data
initialize-configs[.]com
Domain Exploit Support DomainMarch 2026
ms-global.first-update-server[.]com
Domain Exploit Support DomainMarch 2026 — masquerading as Microsoft SQL auth
ms-sql-auth[.]com
Domain Exploit Support DomainMarch 2026
kolonialeru[.]com
Domain Exploit Support DomainMarch 2026
sclair.it[.]com
▸ C2 Domains — Active RAT command-and-control communication
Domain C2 DomainWebSocket C2 — masquerading as browser update service
browser-updater[.]com
Domain C2 DomainWebSocket C2 — alternate TLD for same campaign
browser-updater[.]live
Domain C2 DomainMasquerading as OS update service — block all TLDs
os-update-server[.]com / .org / .live / .top
▸ TLS Fingerprints — Block or alert at network perimeter / NDR
JA3 Exploit TLS FingerprintObserved in both January 2026 and March 2026 exploit waves
b885946e72ad51dca6c70abc2f773506
JA3 Exploit TLS FingerprintObserved in March 2026 post-disclosure wave only
f80d3d09f61892c5846c854dd84ac403
JA4 Exploit TLS FingerprintObserved in both January 2026 and March 2026 exploit waves
t13i1811h1_85036bcba153_b26ce05bbdd6
JA4 Exploit TLS FingerprintObserved in March 2026 post-disclosure wave only
t13i4311h1_c7886603b240_b26ce05bbdd6
▸ HTTP User-Agent — Observed in exploit requests targeting FMC
UA Exploit User-AgentFlag in WAF/SIEM when targeting FMC management ports from unexpected sources
Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:136.0) Gecko/20100101 Firefox/136.0
▸ Beacon Port — Java "phone home" connectivity verification tool
Port Java Beacon TCP PortAny outbound FMC connection to this port = confirmed post-exploitation
TCP/45588
▸ File Hashes — Confirmed malware artifacts (SHA-256)
Hash Certify.exeOffensive AD CS exploitation tool — privilege escalation via certificate abuse
d1caa376cb45b6a1eb3a45c5633c5ef75f7466b8601ed72c8022a8b3f6c1f3be
Hash Screen LockerRansomware payload — deployed in final stage of the attack chain
6c8efbcef3af80a574cb2aa2224c145bb2e37c2f3d3f091571708288ceb22d5f
▸ Ransom Negotiation Portal (TOR)
Onion Ransom Negotiation PortalVictims enter organization ID and email to begin negotiation chat session
hxxp://ebhmkoohccl45qesdbvrjqtyro2hmhkmh6vkyfyjjzfllm3ix72aqaid[.]onion/chat.php
⚠ Hash reliability note: Due to Interlock's per-target artifact customization technique, most file hashes are not reliable indicators — functionally identical tools were modified for each victim, producing different hashes. Prioritize network-based indicators (IPs, domains, TLS fingerprints, ports) for detection. Integrate all indicators into your SIEM, EDR, and firewall blocklists immediately.
Source: Amazon Threat Intelligence / AWS MadPot Global Sensor Network — Published March 18, 2026

Detection Signals

Behavioural Indicators

The following behavioural patterns can be detected without relying on file hashes — critical given Interlock's per-target artifact customization technique:

  • Unexpected outbound HTTP PUT requests originating from the FMC appliance to external IP addresses
  • Presence of ScreenConnect binaries or service entries on the FMC filesystem
  • Anomalous JVM process spawning from the FMC web service process (e.g., child processes of httpd or the FMC Java service)
  • PowerShell scripts staging compressed data to network shares using hostname-based directory structures (\\HOST\Temp\hostname.zip)
  • HAProxy installations with cron jobs deleting all logs under /var/log every 5 minutes
  • Java ServletRequestListener registrations appearing in web application contexts
  • Outbound TCP connections to port 45588 from any internal server
  • WebSocket traffic (WS/WSS) originating from FMC or managed devices to unknown external hosts

Log Monitoring — Suspicious FMC Web Access Log Pattern

# Pattern to hunt in FMC access logs (/var/log/httpd/access_log)
# Flag: HTTP PUT to management API endpoints from external/unexpected source IPs

203.0.113.47 - - [26/Jan/2026:04:12:38 +0000] "PUT /api/fmc_config/v1/domain/{domainUUID}/policy/accesspolicies HTTP/1.1" 200 -

# ALERT: Outbound connection FROM FMC to external IP — should never occur in normal operation
SRC=FMC_MGMT_IP  DST=EXTERNAL_IP  PROTO=TCP  DPT=443

Conceptual Exploit Pattern — Malicious Java Deserialization Request

PUT /api/fmc_config/v1/domain/DOMAIN_UUID/policy/accesspolicies HTTP/1.1
Host: FMC_MGMT_IP
Content-Type: application/x-java-serialized-object
Content-Length: payload_length
Accept: application/json

binary Java serialized gadget chain payload
# Gadget chain: AnnotationInvocationHandler -> LazyMap -> InvokerTransformer -> Runtime.exec()
# Result: root-level command execution within the FMC JVM process space

Host-Based Detection — ScreenConnect & Process Hunting

# Check for ScreenConnect presence on FMC filesystem
find / -name "ScreenConnect*" -o -name "connectwisecontrol*" 2>/dev/null
ps aux | grep -i "screenconnect\|connectwise"
netstat -antp | grep ESTABLISHED | grep -v "cisco\|talos\|sourcefire"

# Threat hunt — RMM tools dropped after web access log modification
find / -name "ScreenConnect*" -o -name "*.msi" -newer /var/log/httpd/access_log 2>/dev/null

# Check for anomalous JVM child processes
ps -ef --forest | grep java

# Review access logs for unexpected PUT requests from non-admin IPs
grep '"PUT' /var/log/httpd/access_log | grep -v "TRUSTED_ADMIN_IP"

# Check for suspicious scheduled tasks or cron jobs
crontab -l
ls -la /etc/cron* /var/spool/cron/

Mitigation & Recommendations

1. PATCH — Apply Cisco's Security Update Immediately

This is the only complete remediation. Apply the official Cisco patch for CVE-2026-20131 without delay. Cisco has confirmed no workarounds exist — software update is the only viable fix.

Advisory Reference: cisco-sa-fmc-rce-NKhnULJh
Affected:          Cisco Secure Firewall Management Center (on-premise)
Not Affected:      Cloud-Delivered FMC (patched automatically by Cisco)
Action:            Navigate to Cisco Software Center and download the latest FMC release

2. HARDEN — Restrict Management Interface Access

The FMC's web-based management interface must not be internet-facing. Enforce access control at the network layer immediately:

# Permit only known, trusted admin IP ranges to reach FMC management port
access-list MGMT_ACL permit tcp ADMIN_NETWORK WILDCARD host FMC_IP eq 443
access-list MGMT_ACL deny   ip any host FMC_IP

  • Isolate the FMC management interface on a dedicated, non-routable management VLAN
  • Enforce MFA on all FMC administrative accounts
  • Disable any unused API endpoints or management protocols on the FMC
  • Review all FMC user accounts and remove any that are unnecessary

3. MONITOR & HUNT — Assume Breach, Investigate Retroactively

Given the 36-day zero-day exploitation window, treat all unpatched FMC instances as potentially compromised and conduct a thorough threat hunt before declaring the environment clean:

# STEP 1: Check for ScreenConnect or unexpected RMM tools
find / -name "ScreenConnect*" -o -name "*.msi" -newer /var/log/httpd/access_log 2>/dev/null

# STEP 2: Audit outbound connections from FMC (should be near-zero)
netstat -antp | grep ESTABLISHED

# STEP 3: Review access logs for unexpected PUT requests
grep '"PUT' /var/log/httpd/access_log | grep -v "TRUSTED_ADMIN_IP"

# STEP 4: Check for suspicious scheduled tasks or cron jobs
crontab -l
ls -la /etc/cron* /var/spool/cron/

  • Review firewall logs for any outbound traffic originating from the FMC management IP
  • Engage Incident Response if ScreenConnect artefacts, unknown processes, or outbound FMC connections are identified
  • Preserve forensic evidence — take memory images of suspected FMC appliances before remediation, given the fileless execution nature of this exploit
  • Monitor for TCP/45588 outbound connections from all internal servers — confirmed post-exploitation indicator

Affected Versions & Patch Status

CVE-2026-20131 — Affected Versions & Patch Status
ProductDeployment ModelPatch Status
Cisco Secure Firewall Management Center (FMC) On-Premise ⚠ Vulnerable - Patch Immediately
Cisco Secure Firewall Management Center (FMC) Cloud-Delivered (cdFMC) ✔ Auto-patched by Cisco
Cisco Adaptive Security Appliance (ASA) On-Premise ✔ Not affected
Cisco Firepower Threat Defense (FTD) On-Premise ✔ Not affected

Conclusion

CVE-2026-20131 is not a vulnerability that can be deprioritised or scheduled for the next maintenance window. A CVSS 10.0, zero authentication required, root-level RCE on a device that controls your entire firewall estate — exploited in silence for 36 days before any patch existed — represents one of the most severe exposure scenarios a network security team can face.

What makes this campaign particularly instructive is how Interlock operated once inside. They didn't just encrypt and ransom immediately. They mapped the network systematically, deployed redundant backdoors in two programming languages, set up proxy relay nodes that wiped their own logs every five minutes, and abused legitimate tools like ScreenConnect and Certify to blend into normal administrative traffic. This is the behaviour of a disciplined, operationally mature threat actor — not an opportunistic script.

The broader lesson is one the industry keeps relearning: perimeter security devices are not immune to the vulnerabilities they are designed to protect against. An FMC compromise doesn't just expose one server — it hands the attacker the master controls for your entire network security policy. That asymmetry is precisely why these devices are targeted first.

Three actions define whether your organisation is exposed or resilient right now:

  1. If you haven't patched — patch today. There is no workaround. Cisco has confirmed it.
  2. If you patched after January 26, 2026 — assume potential compromise and hunt using the IoCs in this post before declaring the environment clean.
  3. If your FMC management interface is reachable from the internet in any way — isolate it immediately, regardless of patch status.

The window between exploitation and detection is where ransomware groups win. Don't give Interlock that window.

References

CVE-2026-20131 — References
#SourceTitleLink
01 Primary IoC SourceAmazon Web Services Amazon threat intelligence teams identify Interlock ransomware campaign targeting enterprise firewalls aws.amazon.com/blogs/security/...
02 Official AdvisoryCisco Security cisco-sa-fmc-rce-NKhnULJh — Cisco Secure FMC RCE Vulnerability sec.cloudapps.cisco.com/...
03 NewsThe Hacker News Interlock Ransomware Exploits Cisco FMC Zero-Day CVE-2026-20131 for Root Access thehackernews.com/2026/03/...
04 NewsSecurity Affairs Interlock group exploiting the CISCO FMC flaw CVE-2026-20131 36 days before disclosure securityaffairs.com/189636/...
05 NewsCyberPress Cisco Firewall Zero-Day Actively Exploited to Deliver Interlock Ransomware cyberpress.org/cisco-firewall-...
06 ResearchAbstract Security Critical Cisco Vulnerabilities: CVE-2026-20079 and CVE-2026-20131 abstract.security/blog/...
07 ResearchArctic Wolf CVE-2026-20079 & CVE-2026-20131 — Threat Advisory arcticwolf.com/resources/blog/...
08 ResearchPurple Ops CVE-2026-20079 and CVE-2026-20131 in Cisco FMC (CVSS 10.0) purple-ops.io/resources-hottest-cves/...

Find the Best Solution to Your Business

Get in touch
Tags:
News

You May Also Like...

check all insights