Amazon's threat intelligence team has uncovered a sophisticated campaign by an advanced threat actor exploiting two zero-day vulnerabilities in widely used enterprise network appliances: Cisco Identity Service Engine (ISE) and Citrix NetScaler Application Delivery Controller (ADC). The vulnerabilities, now tracked as CVE-2025-20337 and CVE-2025-5777, are being actively exploited in the wild. The attackers are using custom malware to target these devices, which serve as critical gatekeepers for network access and authentication. This campaign highlights a strategic focus on compromising core identity and access management (IAM) infrastructure to gain deep, persistent access into target networks. Patches are forthcoming from both vendors, and organizations using these products must prepare for immediate deployment.
This campaign was first identified through Amazon's MadPot honeypot network, which observed indiscriminate scanning and exploitation attempts across the internet. This suggests the actor is casting a wide net to identify vulnerable systems before selecting high-value targets for deeper compromise.
While specific technical details of the exploits are being withheld pending vendor patches, the attack pattern aligns with previous campaigns targeting edge infrastructure. The general TTPs can be inferred:
T1190 - Exploit Public-Facing Application): The actor exploits CVE-2025-20337 on Cisco ISE or CVE-2025-5777 on Citrix NetScaler to gain a foothold on the appliance.T1505.003 - Web Shell): The malware is designed to survive reboots and remain hidden on the compromised appliance, providing long-term access.T1003 - OS Credential Dumping), and map the internal network (T1046 - Network Service Discovery).Compromising an identity management solution like Cisco ISE is particularly devastating, as it could allow the attacker to create rogue user accounts, modify access policies, and bypass network segmentation controls.
The business impact of this campaign is potentially severe. Compromise of Cisco ISE or Citrix NetScaler can lead to a complete breakdown of an organization's network security posture. Attackers can:
Given that these devices are often the primary enforcement point for security policies, their compromise effectively renders many other security controls useless.
Until official IOCs are released, security teams should hunt for anomalous activity on their Cisco ISE and Citrix NetScaler appliances:
| Type | Value | Description |
|---|---|---|
| Log Source | Cisco ISE / Citrix NetScaler System Logs | Monitor for unexpected reboots, service restarts, or error messages, particularly related to Java application components. |
| Network Traffic Pattern | Unusual Outbound Connections | Look for connections from the management interface of ISE/NetScaler appliances to unknown or suspicious IP addresses. These devices should typically only communicate with internal systems and vendor update servers. |
| File Path | /tmp, /var/tmp |
Monitor for the creation of new or suspicious files (e.g., scripts, binaries, web shells) in temporary directories on the appliances. |
| Process Name | java |
Look for anomalous Java processes with unusual command-line arguments or those consuming excessive CPU/memory. |
| User Account Pattern | New Local/Admin Accounts | Monitor for the creation of any new administrative accounts on the appliances, especially those created outside of normal change control windows. |
Network Traffic Analysis is critical here.M1051 - Update Software): This is the primary mitigation. Apply vendor patches for CVE-2025-20337 and CVE-2025-5777 as soon as they become available.M1030 - Network Segmentation): Do not expose the management interfaces of these appliances to the internet. Restrict access to a dedicated, isolated management network. This aligns with D3FEND's Network Isolation.Applying vendor-supplied patches is the most critical step to remediate the zero-day vulnerabilities.
Mapped D3FEND Techniques:
Restrict network access to the management interfaces of Cisco ISE and Citrix NetScaler appliances to prevent exposure to external threats.
Mapped D3FEND Techniques:
Use an IPS or WAF with virtual patching capabilities to block known exploit patterns until patches can be applied.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats