CYBERNEWSMEDIA Network:||
AD · 970×250

Vulnerabilities·Malware & Threats

China-Linked Hackers Exploiting Zero-Day in Cisco Security Gear

The critical zero-day is tracked as CVE-2025-20393 and it impacts Secure Email Gateway and Secure Email and Web Manager appliances. The post China-Linked Hackers Exploiting Zero-Day in Cisco Security Gear appeared first on SecurityWeek.

Cisco vulnerability exploited

Cisco on Wednesday warned customers that a China-linked threat group has been observed exploiting a new zero-day affecting some of its security products.

The vulnerability, tracked as CVE-2025-20393 and classified as having critical severity, impacts appliances running Cisco AsyncOS software for Secure Email Gateway (formerly ESA) and Secure Email and Web Manager (formerly Content SMA).

The zero-day can be exploited to execute arbitrary commands on the underlying operating system with root privileges. 

The exploitation of CVE-2025-20393 was discovered by Cisco’s own Talos security experts. The attacks have been aimed at “a limited subset of appliances with certain ports open to the internet”. 

Cisco Talos has attributed the attacks to a threat actor tracked as UAT-9686, which it believes, with moderate confidence based on the tools and infrastructure it uses, is a Chinese state-sponsored APT. 

According to Talos, the attacks, discovered on December 10, have been ongoing since at least late November.

The campaign has involved AquaShell, a backdoor that provides a custom persistence mechanism, AquaPurge, a tool designed for cleaning log files, and AquaTunnel, which creates a reverse SSH connection for remote access to the compromised system.

In addition, Talos has seen Chisel, an open source tunneling tool.

“Chisel allows an attacker to proxy traffic through a compromised edge device, allowing them to easily pivot through that device into the internal environment,” Talos explained.

Cisco has made available indicators of compromise (IoCs) to help customers detect potential attacks.

The tech giant’s advisory does not mention software patches — this suggests CVE-2025-20393 remains unpatched — and specifically says that no workarounds have been identified. However, the company did share some mitigations.

CISA has added CVE-2025-20393 to its Known Exploited Vulnerabilities (KEV) catalog, instructing federal agencies to address it by December 24.

Other attacks in the wild

Threat intelligence firm GreyNoise on Wednesday reported seeing another large-scale campaign targeting Cisco and Palo Alto Networks products. However, the activity consists of automated login attempts rather than vulnerability exploitation.

SonicWall also warned customers on Wednesday about the exploitation of a zero-day vulnerability

The flaw, a privilege escalation issue impacting SMA1000 appliances, is tracked as CVE-2025-40602, and it has been used in combination with CVE-2025-23006 for unauthenticated remote code execution with root privileges.

Related: SonicWall Patches High-Severity Flaws in Firewalls, Email Security Appliance

Related: CISA Updates Guidance on Patching Cisco Devices Targeted in China-Linked Attacks

Related: Cisco ISE, CitrixBleed 2 Vulnerabilities Exploited as Zero-Days: Amazon

Latest News

CYBERNEWSMEDIAPublisher