Article Details

Scrape Timestamp (UTC): 2025-12-17 22:56:32.484

Source: https://www.theregister.com/2025/12/17/attacks_pummeling_cisco_0day/

Original Article Text

Click to Toggle View

Attacks pummeling Cisco AsyncOS 0-day since late November. No timeline for a patch. Suspected Chinese-government-linked threat actors have been battering a maximum-severity Cisco AsyncOS zero-day vulnerability in some Secure Email Gateway (SEG) and Secure Email and Web Manager (SEWM) appliances for nearly a month, and there's no timeline for a fix. Cisco disclosed the bug, tracked as CVE-2025-20393, on Wednesday and said it affects both physical and virtual SEG and SEWM appliances in certain non-standard configurations where the Spam Quarantine feature is enabled and exposed to the internet.  "On December 10, Cisco became aware of a new cyberattack campaign targeting a limited subset of appliances with certain ports open to the internet … This attack allows the threat actors to execute arbitrary commands with root privileges on the underlying operating system of an affected appliance," according to the security advisory. The vendor also published recommendations for customers to assess exposure and mitigate risks.  According to Cisco's threat intel arm Talos, the attacks have been ongoing "since at least late November 2025."  A Cisco spokesperson declined to answer The Register's questions, including how many appliances have been infected and when it will release a fix. "We strongly urge customers to follow guidance in the advisory to assess any exposure and mitigate risk," the spokesperson said. "Cisco is actively investigating the issue and developing a permanent remediation." Also on Wednesday, the US Cybersecurity and Infrastructure Security Agency added CVE-2025-20393 to its Known Exploited Vulnerabilities (KEV) catalog. In a subsequent report, Cisco Talos on Wednesday pinned the attacks "with moderate confidence" on a Chinese-nexus advanced persistent threat (APT) group it tracks as UAT-9686. After breaking into internet-facing appliances, the attackers deploy a persistent Python-based backdoor called AquaShell, along with AquaTunnel (reverse SSH tunnel), chisel (another tunneling tool), and AquaPurge (log-clearing utility).

Daily Brief Summary

NATION STATE ACTIVITY // Cisco AsyncOS Zero-Day Exploited by Suspected Chinese APT Group

Cisco has disclosed a critical zero-day vulnerability, CVE-2025-20393, affecting certain Secure Email Gateway and Web Manager appliances, with no immediate patch available.

The flaw allows attackers to execute arbitrary commands with root privileges on affected systems, particularly those with exposed Spam Quarantine features.

Cisco's Talos unit attributes the attacks, ongoing since late November 2025, to a Chinese-linked APT group, identified as UAT-9686.

The attackers use a Python-based backdoor, AquaShell, alongside tunneling tools AquaTunnel and chisel, and a log-clearing utility, AquaPurge.

Cisco has issued guidance for customers to evaluate exposure and implement risk mitigation strategies, while actively developing a permanent fix.

The U.S. Cybersecurity and Infrastructure Security Agency has added the vulnerability to its Known Exploited Vulnerabilities catalog, emphasizing its critical nature.

Organizations using affected Cisco appliances should urgently review security advisories and apply recommended mitigations to protect against potential exploitation.