Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Malware & Threats

China-Linked Hackers Exploiting Zero-Day in Cisco Security Gear

The critical zero-day is tracked as CVE-2025-20393 and it impacts Secure Email Gateway and Secure Email and Web Manager appliances.

Cisco vulnerability exploited

Cisco on Wednesday warned customers that a China-linked threat group has been observed exploiting a new zero-day affecting some of its security products.

The vulnerability, tracked as CVE-2025-20393 and classified as having critical severity, impacts appliances running Cisco AsyncOS software for Secure Email Gateway (formerly ESA) and Secure Email and Web Manager (formerly Content SMA).

The zero-day can be exploited to execute arbitrary commands on the underlying operating system with root privileges. 

The exploitation of CVE-2025-20393 was discovered by Cisco’s own Talos security experts. The attacks have been aimed at “a limited subset of appliances with certain ports open to the internet”. 

Cisco Talos has attributed the attacks to a threat actor tracked as UAT-9686, which it believes, with moderate confidence based on the tools and infrastructure it uses, is a Chinese state-sponsored APT. 

According to Talos, the attacks, discovered on December 10, have been ongoing since at least late November.

Advertisement. Scroll to continue reading.

The campaign has involved AquaShell, a backdoor that provides a custom persistence mechanism, AquaPurge, a tool designed for cleaning log files, and AquaTunnel, which creates a reverse SSH connection for remote access to the compromised system.

In addition, Talos has seen Chisel, an open source tunneling tool.

“Chisel allows an attacker to proxy traffic through a compromised edge device, allowing them to easily pivot through that device into the internal environment,” Talos explained.

Cisco has made available indicators of compromise (IoCs) to help customers detect potential attacks.

The tech giant’s advisory does not mention software patches — this suggests CVE-2025-20393 remains unpatched — and specifically says that no workarounds have been identified. However, the company did share some mitigations.

CISA has added CVE-2025-20393 to its Known Exploited Vulnerabilities (KEV) catalog, instructing federal agencies to address it by December 24.

Other attacks in the wild

Threat intelligence firm GreyNoise on Wednesday reported seeing another large-scale campaign targeting Cisco and Palo Alto Networks products. However, the activity consists of automated login attempts rather than vulnerability exploitation.

SonicWall also warned customers on Wednesday about the exploitation of a zero-day vulnerability

The flaw, a privilege escalation issue impacting SMA1000 appliances, is tracked as CVE-2025-40602, and it has been used in combination with CVE-2025-23006 for unauthenticated remote code execution with root privileges.

Related: SonicWall Patches High-Severity Flaws in Firewalls, Email Security Appliance

Related: CISA Updates Guidance on Patching Cisco Devices Targeted in China-Linked Attacks

Related: Cisco ISE, CitrixBleed 2 Vulnerabilities Exploited as Zero-Days: Amazon

Written By

Eduard Kovacs (@EduardKovacs) is senior managing editor at SecurityWeek. He worked as a high school IT teacher before starting a career in journalism in 2011. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

With "Shadow AI" usage becoming prevalent in organizations, learn how to balance the need for rapid experimentation with the rigorous controls required for enterprise-grade deployment.

Register

Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Register

People on the Move

Chris Sistrunk has been promoted to Practice Leader for Mandiant's OT Security Consulting.

Nudge Security has appointed Patrick Dillon as its Chief Revenue Officer.

AutoNation has appointed Brian Fricke as Chief Information Security Officer.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.