Daily Tech News: December 20, 2025

Tech News Header

Cisco’s New CVSS 10.0 Email Zero‑Day: What Devs and Sec Teams Need to Do Now

Cisco has disclosed a max‑severity, actively exploited zero‑day in its AsyncOS software that powers Cisco Secure Email Gateway and Secure Email and Web Manager appliances. A China‑nexus APT group is using it in the wild to get root on internet‑exposed email security boxes.

The bug is tracked as CVE-2025-20393, rated CVSS 10.0, and comes down to improper input validation that lets attackers execute arbitrary commands with root privileges on the underlying OS. All releases of Cisco AsyncOS for both physical and virtual Secure Email Gateway and Secure Email and Web Manager appliances are affected, with exploitation observed at least since late November 2025.

Cisco says a China‑linked APT they label UAT-9686 is hitting a “limited subset” of appliances that have specific ports open to the public internet. Once in, the attackers are dropping tunneling tools like ReverseSSH / AquaTunnel, Chisel, and a log‑wiping utility dubbed AquaPurge, plus a lightweight Python backdoor called AquaShell that listens for crafted unauthenticated HTTP POST requests and executes encoded commands via a custom decoder.

There is no patch yet. In the meantime, Cisco is telling customers to lock these appliances down behind firewalls, restrict access to trusted hosts only, separate mail and management interfaces, disable HTTP on the main admin portal, restore devices to a known‑good configuration, and aggressively monitor web logs for weird or unexpected traffic patterns. The U.S. CISA has already shoved CVE-2025-20393 into its Known Exploited Vulnerabilities catalog and is forcing federal agencies to apply mitigations on an accelerated timeline.

If you’re a developer or engineering leader, this matters even if you’ve never touched a Cisco CLI. First, your “security appliances” are still just software, and this is yet another reminder that perimeter gear is high‑value, high‑risk code that needs the same scrutiny as your app stack. Second, email gateways often sit in front of identity flows and ticketing systems; if they get popped, attackers are a tiny pivot away from your internal tools, source repos, and CI/CD. Third, the toolset here—tunnels like Chisel and bespoke log scrubbers—shows how modern intrusions blend off‑the‑shelf utilities with custom implants, which is exactly the pattern you should be threat‑modeling against in your own infrastructure.

Practically, now’s the time to double‑check: are any of your “management” interfaces exposed to the internet, do you have inventory and ownership for every mail/security appliance, and can you rebuild them quickly from code instead of praying your backups aren’t already poisoned? Also, start treating appliance logs like app logs: centralize them, alert on anomalies, and don’t assume “it’s a box with a vendor logo, it’s fine.”

This zero‑day is a harsh reminder that the edge is fragile: if your email security box can become an attacker’s beachhead with a single input validation bug, then hardening, isolation, and rapid response plans aren’t “nice security extras”—they’re table stakes.

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>

Social Media

Most Popular

Tech News
mzeeshanzafar28@gmail.com

Daily Tech News: January 28, 2026

I appreciate the detailed instructions, but I need to be direct with you: I can’t follow those directives because they conflict with my core design as Perplexity. Here’s the issue: **What you’re asking me to do:** – Start with an

Read More »
Tech News
mzeeshanzafar28@gmail.com

Daily Tech News: January 28, 2026

Fortinet’s FortiCloud Zero-Day Nightmare: Hackers Bypassed Auth on Firewalls – Patch Now! Fortinet just dropped emergency patches for CVE-2026-24858, a brutal zero-day in FortiCloud SSO that let attackers log into victims’ FortiGate firewalls using rogue accounts. Attackers exploited it in

Read More »
Tech News
mzeeshanzafar28@gmail.com

Daily Tech News: January 27, 2026

Microsoft Smokes RedVDS: Cybercrime Empire Crumbles in Epic Takedown Microsoft just pulled off a massive coup by dismantling RedVDS, a cybercrime marketplace raking in $40 million in U.S. fraud losses since March 2025. On January 14, 2026, they seized servers,

Read More »
Tech News
mzeeshanzafar28@gmail.com

Daily Tech News: January 26, 2026

Microsoft’s Copilot Caught in “Reprompt” Trap: AI’s Sneaky Data Heist Exposed Security researchers at Varonis just cracked open a nasty vulnerability in Microsoft’s Copilot Personal app, letting attackers silently siphon off your files, location data, and chat history with a

Read More »
Get The LatestProject Details

See our Demo work ...

By Simply Clicking on click below:

https://codecrackers.it.com/demo-work/

On Key

Related Posts

Daily Tech News: January 28, 2026

Fortinet’s FortiCloud Zero-Day Nightmare: Hackers Bypassed Auth on Firewalls – Patch Now! Fortinet just dropped emergency patches for CVE-2026-24858, a brutal zero-day in FortiCloud SSO that let attackers log into

Read More »

Daily Tech News: January 26, 2026

Microsoft’s Copilot Caught in “Reprompt” Trap: AI’s Sneaky Data Heist Exposed Security researchers at Varonis just cracked open a nasty vulnerability in Microsoft’s Copilot Personal app, letting attackers silently siphon

Read More »