Sunday, December 21, 2025

Cisco Flags Critical Zero-Day Exploited in Targeted APT Campaign

Cisco has issued an urgent warning after uncovering an active exploitation campaign against its AsyncOS software, used in Cisco Secure Email Gateway and Secure Email and Web Manager appliances. The vulnerability, rated at the highest severity level, is being leveraged by a China-linked advanced persistent threat group tracked as UAT-9686.

The company disclosed that it identified the malicious activity on December 10, 2025, noting that the attacks were focused on a narrow set of internet-exposed appliances configured in a specific way. While Cisco has not disclosed the exact number of impacted customers, it emphasized that the scope appears limited due to the attack’s dependency on non-default settings.

According to Cisco, successful exploitation enables attackers to run arbitrary commands with full root-level access on affected systems. Investigators also discovered that the intruders installed a custom persistence mechanism, allowing continued control even after initial access was gained.

The vulnerability only affects devices that meet two criteria: they must be directly reachable from the public internet and have the spam quarantine feature enabled. Cisco clarified that neither condition is enabled by default, which may explain the relatively small exposure footprint observed so far.

Independent internet scanning services have reported seeing exposed systems, but Cisco declined to confirm those findings when asked to validate the numbers. The company has not yet released a security patch, making the situation particularly challenging for defenders.

In the absence of an update, Cisco is advising affected customers to completely wipe compromised appliances and restore them to a known-good, secure state. This step is currently the only reliable way to eliminate attacker persistence.

Given the role these appliances play—filtering email traffic and safeguarding enterprise communications—a breach could have serious consequences. Threat actors with root access could potentially monitor sensitive correspondence, introduce malware or ransomware, or use the devices as a foothold for deeper network penetration.

Security teams are urged to review Cisco’s advisory immediately, audit configurations for unnecessary internet exposure, and monitor closely for indicators of compromise. Until a patch becomes available, organizations may want to temporarily restrict external access to these systems to reduce risk.

Cisco has not provided an estimated release date for a fix, underscoring the importance of interim defensive measures while the investigation continues.

By - Aaradhay Sharma

No comments:

Post a Comment

Death by Algorithm: Preparing for the New Age of Legal Liability

The era of digital globalisation is hitting a hard border. For decades, the tech industry operated under the assumption that a single, mass...