A previously unknown vulnerability in Cisco's Firewall Management Center (FMC) software has been exploited as a zero-day in Interlock ransomware attacks, with evidence suggesting exploitation began in late January. The vulnerability, found in Cisco's FMC software, has been linked to threat actors based in Russia. Amazon's investigation revealed that the attackers have been using this zero-day exploit to gain unauthorized access to targeted networks. The fact that this vulnerability has been exploited in the wild for several weeks underscores the urgency of patching and assessing exposure to this threat. Cisco users should take immediate action to mitigate potential damage, as the window for patching is rapidly closing. The exploitation of this vulnerability in zero-day attacks highlights the importance of proactive vulnerability management and swift patching to prevent ransomware attacks, so what matters most to practitioners is assessing their exposure to this threat immediately1.
Cisco Firewall Vulnerability Exploited as Zero-Day in Interlock Ransomware Attacks
⚠️ Critical Alert
Why This Matters
Zero-day activity targeting Amazon means patching windows are already closing — assess your exposure immediately.
References
- SecurityWeek. (2026, March 19). Cisco Firewall Vulnerability Exploited as Zero-Day in Interlock Ransomware Attacks. SecurityWeek. https://www.securityweek.com/cisco-firewall-vulnerability-exploited-as-zero-day-in-interlock-ransomware-attacks/
Original Source
SecurityWeek
Read original →