Chinese Hackers Exploit Cisco's Unpatched Zero-Day Vulnerabilities

Cisco zero-day AsyncOS vulnerability CVE-2025-20393 UAT-9686 China threat group email security cybersecurity
Alan V Gutnov
Alan V Gutnov

Director of Strategy

 
December 19, 2025 3 min read
Chinese Hackers Exploit Cisco's Unpatched Zero-Day Vulnerabilities

TL;DR

Cisco customers are currently under attack from a Chinese threat group exploiting a critical zero-day vulnerability (CVE-2025-20393) in AsyncOS software. This vulnerability allows attackers to gain unrestricted privileges and install backdoors. While no patch is available, Cisco has outlined essential mitigation steps, and CISA has added it to its Known Exploited Vulnerabilities catalog, urging immediate action.

Cisco Customers Under Attack via Zero-Day Vulnerability

Cisco customers are facing a new wave of attacks from a Chinese threat group exploiting a critical zero-day vulnerability. This vulnerability affects Cisco's AsyncOS software for Cisco Secure Email Gateway and Cisco Secure Email and Web Manager. The attacks have been ongoing since at least late November. Cisco became aware of the attacks on December 10.

Technical Details of the Vulnerability (CVE-2025-20393)

The vulnerability, identified as CVE-2025-20393, has a CVSS rating of 10. It is an improper input validation vulnerability affecting Cisco AsyncOS software that allows attackers to execute commands with unrestricted privileges. This enables them to implant persistent backdoors on compromised devices. Successful exploitation requires the Spam Quarantine feature to be enabled and publicly exposed. This feature is not enabled by default.

  • Cisco Security Advisory
  • NIST CVE Details
  • Explanation of Spam Quarantine Feature
  • Steps to Check Spam Quarantine Configuration

Threat Actor: UAT-9686

Cisco Talos researchers attribute these attacks to a Chinese advanced persistent threat group tracked as UAT-9686. This group's tooling and infrastructure are consistent with other China state-sponsored threat groups like APT41 and UNC5174. The attackers are using tunneling tools such as ReverseSSH (aka AquaTunnel) and Chisel, and a log cleaning utility called AquaPurge.

Cisco Warns of Active Attacks Exploiting Unpatched 0-Day in AsyncOS Email Security Appliances
Image courtesy of The Hacker News

AquaShell Backdoor

The attackers deployed a lightweight Python backdoor called AquaShell. This backdoor passively listens for unauthenticated HTTP POST requests containing specially crafted data. Upon identifying such a request, it attempts to parse the contents using a custom decoding routine and executes them in the system shell.

Mitigation Steps

As there is currently no patch, Cisco recommends restoring appliances to a secure configuration. Other recommendations include limiting access from the internet, securing devices behind a firewall to allow traffic only from trusted hosts, and separating mail and management functionality onto separate network interfaces. Disabling HTTP for the main administrator portal and monitoring web log traffic for unexpected traffic are also advised. Cisco also suggests turning off any unnecessary network services, using strong end-user authentication methods (like SAML or LDAP), and changing the default administrator password. In case of confirmed compromise, Cisco says rebuilding the appliances is the only way to eradicate the threat actor's persistence mechanism.

To protect against sophisticated threats like UAT-9686, organizations need advanced cybersecurity solutions. Gopher Security specializes in AI-powered, post-quantum Zero-Trust cybersecurity architecture. Our platform converges networking and security across devices, apps, and environments—from endpoints and private networks to cloud, remote access, and containers—using peer-to-peer encrypted tunnels and quantum-resistant cryptography.

CISA Action

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2025-20393 to its Known Exploited Vulnerabilities (KEV) catalog. Federal Civilian Executive Branch (FCEB) agencies must apply the necessary mitigations by December 24, 2025, to secure their networks.

  • CISA Adds CVE-2025-20393 to KEV
  • CISA Known Exploited Vulnerabilities Catalog
  • Federal Civilian Executive Branch Definition
  • CISA Emergency Directive

Protect your organization with Gopher Security's AI-powered, post-quantum Zero-Trust cybersecurity architecture. Contact us today to learn more and secure your network against advanced threats.

Alan V Gutnov
Alan V Gutnov

Director of Strategy

 

MBA-credentialed cybersecurity expert specializing in Post-Quantum Cybersecurity solutions with proven capability to reduce attack surfaces by 90%.

Related News

Critical LangChain Vulnerability Risks AI Secrets and Workflows
LangChain vulnerabilities

Critical LangChain Vulnerability Risks AI Secrets and Workflows

Discover critical vulnerabilities in LangChain, including LangGrinch and RCE flaws. Learn about CVEs and how to secure your AI applications. Update now!

By Alan V Gutnov December 26, 2025 5 min read
Read full article
Polymarket Security Issues: Third-Party Breaches and User Complaints
Polymarket security breach

Polymarket Security Issues: Third-Party Breaches and User Complaints

Polymarket users report drained funds after a security breach. Learn what happened and essential security tips to safeguard your crypto. Protect your assets now!

By Divyansh Ingle December 25, 2025 3 min read
Read full article
Aflac Cybersecurity Incident: 22.6 Million Personal Data Stolen
Aflac data breach

Aflac Cybersecurity Incident: 22.6 Million Personal Data Stolen

Aflac confirms a massive data breach impacting 22.65 million individuals. Learn what data was compromised and how to protect yourself. Read more now!

By Edward Zhou December 24, 2025 2 min read
Read full article
Coupang Faces Fallout Over Major Data Breach and CEO Resignation
Coupang data breach

Coupang Faces Fallout Over Major Data Breach and CEO Resignation

South Korea's e-commerce giant Coupang suffered a massive data breach impacting 33 million users. CEO resigns as investigation intensifies. Learn how to protect yourself. Read more!

By Alan V Gutnov December 18, 2025 2 min read
Read full article