Chinese Hackers Exploit Cisco's Unpatched Zero-Day Vulnerabilities

Cisco zero-day AsyncOS vulnerability CVE-2025-20393 UAT-9686 China threat group email security cybersecurity
Alan V Gutnov
Alan V Gutnov

Director of Strategy

 
December 19, 2025
3 min read
Chinese Hackers Exploit Cisco's Unpatched Zero-Day Vulnerabilities

TL;DR

  • Cisco customers are currently under attack from a Chinese threat group exploiting a critical zero-day vulnerability (CVE-2025-20393) in AsyncOS software. This vulnerability allows attackers to gain unrestricted privileges and install backdoors. While no patch is available, Cisco has outlined essential mitigation steps, and CISA has added it to its Known Exploited Vulnerabilities catalog, urging immediate action.

Cisco Customers Under Attack via Zero-Day Vulnerability

Cisco customers are facing a new wave of attacks from a Chinese threat group exploiting a critical zero-day vulnerability. This vulnerability affects Cisco's AsyncOS software for Cisco Secure Email Gateway and Cisco Secure Email and Web Manager. The attacks have been ongoing since at least late November. Cisco became aware of the attacks on December 10.

Technical Details of the Vulnerability (CVE-2025-20393)

The vulnerability, identified as CVE-2025-20393, has a CVSS rating of 10. It is an improper input validation vulnerability affecting Cisco AsyncOS software that allows attackers to execute commands with unrestricted privileges. This enables them to implant persistent backdoors on compromised devices. Successful exploitation requires the Spam Quarantine feature to be enabled and publicly exposed. This feature is not enabled by default.

  • Cisco Security Advisory
  • NIST CVE Details
  • Explanation of Spam Quarantine Feature
  • Steps to Check Spam Quarantine Configuration

Threat Actor: UAT-9686

Cisco Talos researchers attribute these attacks to a Chinese advanced persistent threat group tracked as UAT-9686. This group's tooling and infrastructure are consistent with other China state-sponsored threat groups like APT41 and UNC5174. The attackers are using tunneling tools such as ReverseSSH (aka AquaTunnel) and Chisel, and a log cleaning utility called AquaPurge.

Cisco Warns of Active Attacks Exploiting Unpatched 0-Day in AsyncOS Email Security Appliances

Image courtesy of The Hacker News

AquaShell Backdoor

The attackers deployed a lightweight Python backdoor called AquaShell. This backdoor passively listens for unauthenticated HTTP POST requests containing specially crafted data. Upon identifying such a request, it attempts to parse the contents using a custom decoding routine and executes them in the system shell.

Mitigation Steps

As there is currently no patch, Cisco recommends restoring appliances to a secure configuration. Other recommendations include limiting access from the internet, securing devices behind a firewall to allow traffic only from trusted hosts, and separating mail and management functionality onto separate network interfaces. Disabling HTTP for the main administrator portal and monitoring web log traffic for unexpected traffic are also advised. Cisco also suggests turning off any unnecessary network services, using strong end-user authentication methods (like SAML or LDAP), and changing the default administrator password. In case of confirmed compromise, Cisco says rebuilding the appliances is the only way to eradicate the threat actor's persistence mechanism.

To protect against sophisticated threats like UAT-9686, organizations need advanced cybersecurity solutions. Gopher Security specializes in AI-powered, post-quantum Zero-Trust cybersecurity architecture. Our platform converges networking and security across devices, apps, and environments—from endpoints and private networks to cloud, remote access, and containers—using peer-to-peer encrypted tunnels and quantum-resistant cryptography.

CISA Action

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2025-20393 to its Known Exploited Vulnerabilities (KEV) catalog. Federal Civilian Executive Branch (FCEB) agencies must apply the necessary mitigations by December 24, 2025, to secure their networks.

  • CISA Adds CVE-2025-20393 to KEV
  • CISA Known Exploited Vulnerabilities Catalog
  • Federal Civilian Executive Branch Definition
  • CISA Emergency Directive

Protect your organization with Gopher Security's AI-powered, post-quantum Zero-Trust cybersecurity architecture. Contact us today to learn more and secure your network against advanced threats.

Alan V Gutnov
Alan V Gutnov

Director of Strategy

 

MBA-credentialed cybersecurity expert specializing in Post-Quantum Cybersecurity solutions with proven capability to reduce attack surfaces by 90%.

Related News

2026 Cybersecurity Trends: Dominance of Vulnerability Exploits
vulnerability exploits

2026 Cybersecurity Trends: Dominance of Vulnerability Exploits

Vulnerability exploits now account for 40% of cyber intrusions, surpassing phishing. Learn how shrinking patch windows and edge device targets are changing security.

By Brandon Woo April 6, 2026 3 min read
common.read_full_article
Surge in Vulnerability Exploits: Cyber Intrusions Trends 2026
cybersecurity trends 2026

Surge in Vulnerability Exploits: Cyber Intrusions Trends 2026

Vulnerability exploits now drive 40% of cyberattacks as hackers weaponize flaws within hours. Learn why traditional patching is failing and how to adapt. Read more.

By Divyansh Ingle March 30, 2026 3 min read
common.read_full_article
Surge in Vulnerability Exploits Dominates 2026 Cyber Intrusions
Vulnerability Exploitation

Surge in Vulnerability Exploits Dominates 2026 Cyber Intrusions

Hackers are weaponizing zero-days within hours of disclosure, leaving traditional patch cycles in the dust. Learn how to bridge the security gap with MFA and Zero-Trust.

By Alan V Gutnov March 23, 2026 4 min read
common.read_full_article
Vulnerability Exploits Dominate Cyber Intrusions in 2026 Trends
vulnerability exploits

Vulnerability Exploits Dominate Cyber Intrusions in 2026 Trends

Exploits are the leading cause of cyber intrusions, outpacing phishing. Discover the latest trends and essential strategies to protect your organization. Read now!

By Brandon Woo March 16, 2026 3 min read
common.read_full_article