China-Linked Hackers Exploit Critical Cisco Email Gateway Zero-Day

Cisco Discloses Actively Exploited Zero-Day (CVE-2025-20393) in Email Security Appliances Linked to Chinese APT

CRITICAL
December 19, 2025
6m read
VulnerabilityThreat ActorCyberattack

Related Entities

Threat Actors

UAT-9686

Products & Tech

Cisco Secure Email GatewayCisco Secure Email and Web ManagerAsyncOS

Other

China

CVE Identifiers

CVE-2025-20393
CRITICAL
CVSS:10

Full Report

Executive Summary

Cisco has issued a critical security advisory regarding a zero-day vulnerability, CVE-2025-20393, affecting its Secure Email Gateway and Secure Email and Web Manager products running AsyncOS. This flaw, rated with a CVSS score of 10.0, allows for unauthenticated remote code execution with root privileges. A China-linked threat actor, which Cisco Talos tracks as UAT-9686, has been actively exploiting this vulnerability in targeted attacks since late November 2025. The attackers have successfully compromised appliances and installed persistence mechanisms. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2025-20393 to its Known Exploited Vulnerabilities (KEV) catalog, underscoring the urgency for organizations to apply patches immediately.


Vulnerability Details

CVE-2025-20393 is a critical vulnerability that resides in the web-based management interface of Cisco appliances running AsyncOS software. The flaw allows a remote, unauthenticated attacker to craft a malicious HTTP request and send it to an affected device. Successful exploitation results in the execution of arbitrary commands on the underlying operating system with root privileges.

  • Affected Products: Cisco Secure Email Gateway and Cisco Secure Email and Web Manager.
  • Affected Software: Specific versions of AsyncOS.
  • Attack Vector: Network
  • Prerequisites: The appliance's management interface must be exposed to the attacker, which Cisco notes has occurred in a "limited subset of appliances" with specific ports exposed to the internet.

Threat Overview

The exploitation campaign is attributed to UAT-9686, a threat actor believed to be affiliated with China. The assessment is based on the unique tools, tactics, and infrastructure observed by Cisco Talos during the investigation. The campaign began in late November 2025 and appears to be targeted, focusing on a select group of organizations.

Attack Chain:

  1. Initial Access: The threat actor exploits CVE-2025-20393 against a vulnerable, internet-exposed Cisco email appliance to gain a foothold (T1190 - Exploit Public-Facing Application).
  2. Execution: The exploit achieves remote code execution with the highest possible privileges (root), giving the attacker complete control over the device (T1203 - Exploitation for Client Execution).
  3. Persistence: After gaining access, UAT-9686 deploys a persistence mechanism to ensure continued control over the compromised appliance even after a reboot (T1543 - Create or Modify System Process). The specifics of the persistence mechanism have not been publicly detailed by Cisco.

Compromising an email security gateway is a high-value objective for a nation-state actor. It provides a powerful position for espionage, allowing the interception of sensitive communications, data theft, and a launchpad for further lateral movement into the target network.


Impact Assessment

A compromised email security gateway presents a grave threat to an organization. The potential impact includes:

  • Data Exfiltration: Attackers can intercept, read, and steal all incoming and outgoing email communications, including sensitive corporate data, intellectual property, and personally identifiable information (PII).
  • Network Infiltration: The compromised appliance can be used as a beachhead to pivot deeper into the corporate network, bypassing other perimeter defenses.
  • Credential Theft: The appliance may cache credentials or have access to directory services, which attackers can steal to escalate privileges.
  • Further Attacks: Attackers can manipulate email flows, inject malware into legitimate email threads, and conduct highly convincing phishing campaigns from a trusted internal source.

Given the attribution to a sophisticated APT group and the critical nature of the targeted asset, this incident poses a significant national security and corporate espionage risk.


Cyber Observables for Detection

Organizations with potentially affected Cisco appliances should hunt for the following:

Type Value Description Context Confidence
url_pattern * Unusual or malformed HTTP requests to the web management interface of Cisco email appliances. Web server logs on the appliance, network traffic captures. high
log_source AsyncOS System Logs Check for unexpected reboots, configuration changes, or error messages related to the web interface. Cisco appliance syslog output. high
network_traffic_pattern * Outbound connections from the appliance's management interface to unknown IP addresses. Firewall logs, Netflow data. high
file_path / Unexplained or unauthorized files in the appliance's file system, particularly in system directories. Appliance CLI, forensic image analysis. medium
process_name * Anomalous processes running on the appliance that are not part of the standard AsyncOS services. Appliance CLI (top, ps). medium

Detection & Response

  • Log Review: Immediately review logs from Cisco Secure Email Gateway and Web Manager appliances for any signs of unauthorized access, unexpected system reboots, or configuration changes. Pay close attention to logs from the web management interface.
  • Network Traffic Analysis: Monitor network traffic from the management interfaces of these appliances. Any outbound connections to external IP addresses are highly suspicious and should be investigated. Reference D3-NTA: Network Traffic Analysis.
  • Integrity Checks: Use Cisco's built-in tools to perform file system and configuration integrity checks to identify unauthorized modifications made by the threat actor.
  • CISA KEV Catalog: Since CVE-2025-20393 is on the KEV catalog, organizations should leverage this intelligence to prioritize detection and response efforts.

Mitigation

  1. Apply Patches: Cisco has released software updates to address this vulnerability. Organizations must upgrade their appliances to a fixed version of AsyncOS immediately. This is the primary mitigation. Reference M1051 - Update Software.
  2. Restrict Access: Restrict access to the web management interface of Cisco email appliances. These interfaces should not be exposed to the internet. Access should be limited to a secure management network and controlled via strict firewall rules. Reference M1035 - Limit Access to Resource Over Network.
  3. Network Segmentation: Ensure the management interfaces of network appliances are on a separate, isolated network segment, away from user and production traffic. Reference M1030 - Network Segmentation.
  4. Multi-Factor Authentication (MFA): While this flaw is unauthenticated, enforcing MFA on all administrative access, including to network appliances, is a critical best practice that can thwart other attack vectors. Reference M1032 - Multi-factor Authentication.

Timeline of Events

1
November 1, 2025
The exploitation campaign by UAT-9686 began in late November 2025.
2
December 19, 2025
Cisco publicly discloses the zero-day vulnerability and its active exploitation.
3
December 19, 2025
This article was published

MITRE ATT&CK Mitigations

Applying the security updates provided by Cisco is the most effective way to remediate this vulnerability.

Mapped D3FEND Techniques:

Do not expose management interfaces to the internet. Restrict access to a dedicated, secure management LAN.

Mapped D3FEND Techniques:

Use firewall rules to strictly control which IP addresses can communicate with the appliance's management interface.

Mapped D3FEND Techniques:

Audit

M1047enterprise

Enable and forward all logs from the appliance to a central SIEM for monitoring and correlation.

Mapped D3FEND Techniques:

D3FEND Defensive Countermeasures

Implement strict inbound traffic filtering for the management interfaces of all Cisco Secure Email Gateways. These interfaces should never be exposed to the public internet. Create explicit firewall rules that only allow access from a small, well-defined set of internal IP addresses, such as a dedicated security administration subnet or jump box. All other traffic should be denied by default. This is a critical compensating control that would have prevented the initial exploitation of CVE-2025-20393 in most environments by making the vulnerable interface unreachable to the external attacker.

Deploy network monitoring to specifically analyze traffic originating from the management interfaces of your Cisco email appliances. Establish a baseline of normal traffic patterns. Given that UAT-9686 installed a persistence mechanism, it is highly likely to communicate with an external command-and-control (C2) server. Configure alerts for any outbound connections from these management interfaces to the internet. This is highly anomalous behavior and a strong indicator of compromise. Use NetFlow, Zeek, or full packet capture to identify destination IPs, ports, and data transfer volumes.

The primary remediation is to immediately apply the patches released by Cisco for CVE-2025-20393. Due to its status as an actively exploited zero-day by a nation-state actor, this should be treated as an emergency change. Use your asset inventory to identify all affected Cisco Secure Email Gateway and Secure Email and Web Manager appliances. Schedule and deploy the fixed AsyncOS version without delay. After patching, verify the update was successful and that the appliance is no longer reported as vulnerable by your scanning tools. This action directly closes the attack vector.

Sources & References

Windows RemoteApp flaw, ferry malware arrest
CISO Series (cisoseries.com) December 19, 2025
Chinese Hackers Exploited a Zero-Day in Cisco Email Security Systems
Centraleyes (centraleyes.com) December 19, 2025

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

Zero-DayCiscoAPTUAT-9686ChinaRCEKEVCISA

📢 Share This Article

Help others stay informed about cybersecurity threats

Continue Reading