Cybersecurity News and Headlines
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Cybersecurity Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
CybersecurityNewsCisco Finally Fixes AsyncOS Zero-Day Exploited Since November
Cisco Finally Fixes AsyncOS Zero-Day Exploited Since November
Cybersecurity

Cisco Finally Fixes AsyncOS Zero-Day Exploited Since November

•January 16, 2026
0
BleepingComputer
BleepingComputer•Jan 16, 2026

Companies Mentioned

Cisco

Cisco

CSCO

Why It Matters

The vulnerability compromised core email security infrastructure, exposing organizations to credential theft and data exfiltration, while the mandatory federal deadline underscores the systemic risk of unpatched network appliances.

Key Takeaways

  • •Cisco patches CVE‑2025‑20393 for SEG and SEWM
  • •Vulnerability exploited via Spam Quarantine Internet exposure
  • •Chinese‑linked group UAT‑9686 used AquaShell backdoor
  • •CISA orders federal patching by Dec 24 under BOD 22‑01
  • •AquaTunnel and Chisel used for reverse‑SSH tunneling

Pulse Analysis

The AsyncOS flaw highlighted a persistent blind spot in appliance hardening: when the Spam Quarantine feature is enabled and reachable from the internet, input validation failures can grant attackers root‑level command execution. Unlike typical web‑app bugs, this vulnerability resides in the underlying operating system of Cisco’s Secure Email Gateway and Secure Email and Web Manager platforms, making detection difficult and remediation urgent. Enterprises that expose these appliances for inbound email filtering without strict network segmentation were especially vulnerable, prompting a rapid industry response.

Threat intelligence from Cisco Talos traced the exploitation to a Chinese‑nexus APT, designated UAT‑9686, which leveraged a suite of custom tools. AquaShell provided persistent backdoor access, while AquaTunnel and the open‑source Chisel utility created reverse‑SSH tunnels to bypass perimeter defenses. The attackers also employed AquaPurge to erase logs, obscuring forensic trails. This toolset mirrors tactics used by known groups such as APT41 and UNC5174, suggesting shared infrastructure and a broader campaign targeting email security appliances worldwide.

Cisco’s patch, detailed in a security advisory, addresses the input validation weakness and restores secure defaults for the Spam Quarantine function. CISA’s inclusion of CVE‑2025‑20393 in its Known Exploited Vulnerabilities catalog and the issuance of Binding Operational Directive 22‑01 force federal agencies to apply the fix within a week, signaling heightened regulatory scrutiny. For the private sector, the episode reinforces the need for continuous vulnerability management, rapid patch deployment, and strict network segmentation of critical security appliances to mitigate similar high‑impact threats in the future.

Cisco finally fixes AsyncOS zero-day exploited since November

Read Original Article
0

Comments

Want to join the conversation?

Loading comments...