PT-2025-51842 · Cisco · Cisco Secure Email Gateway
Published
2025-12-17
·
Updated
2026-02-21
·
CVE-2025-20393
CVSS v3.1
10
Critical
| Vector | AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
Cisco AsyncOS versions prior to the fix for CVE-2025-20393
Cisco Secure Email Gateway (SEG) versions prior to the fix for CVE-2025-20393
Cisco Secure Email and Web Manager (SEWM) versions prior to the fix for CVE-2025-20393
Description
Cisco AsyncOS software, used in Cisco Secure Email Gateway (SEG) and Cisco Secure Email and Web Manager (SEWM) appliances, contains a critical improper input validation vulnerability (CVE-2025-20393) with a CVSS score of 10.0. This flaw allows an unauthenticated, remote attacker to execute arbitrary commands with root privileges on affected systems. The vulnerability is actively exploited in the wild by a China-linked threat actor (UAT-9686) who has been observed deploying tools like AquaShell (a Python backdoor), AquaTunnel, Chisel, and AquaPurge for persistence, tunneling, and log manipulation. Successful exploitation grants attackers full control of the appliance, potentially enabling long-term surveillance, credential access, and use as a pivot point for further compromise. The vulnerability is present when the Spam Quarantine feature is enabled and accessible from the internet.
Recommendations
Apply the security updates released by Cisco to address CVE-2025-20393.
If the Spam Quarantine feature is enabled, restrict internet access to the appliance.
Review and restrict administrative access to the appliance.
Rotate credentials and keys.
Monitor logs for anomalous activity.
If compromise is suspected, rebuild the affected appliance.
Disable the Spam Quarantine feature if it is not essential.
Fix
RCE
Found an issue in the description? Have something to add? Feel free to write us 👾
Related Identifiers
Affected Products
Cisco Secure Email Gateway