Cisco’s New CVSS 10.0 Email Zero‑Day: What Devs and Sec Teams Need to Do Now
Cisco has disclosed a max‑severity, actively exploited zero‑day in its AsyncOS software that powers Cisco Secure Email Gateway and Secure Email and Web Manager appliances. A China‑nexus APT group is using it in the wild to get root on internet‑exposed email security boxes.
The bug is tracked as CVE-2025-20393, rated CVSS 10.0, and comes down to improper input validation that lets attackers execute arbitrary commands with root privileges on the underlying OS. All releases of Cisco AsyncOS for both physical and virtual Secure Email Gateway and Secure Email and Web Manager appliances are affected, with exploitation observed at least since late November 2025.
Cisco says a China‑linked APT they label UAT-9686 is hitting a “limited subset” of appliances that have specific ports open to the public internet. Once in, the attackers are dropping tunneling tools like ReverseSSH / AquaTunnel, Chisel, and a log‑wiping utility dubbed AquaPurge, plus a lightweight Python backdoor called AquaShell that listens for crafted unauthenticated HTTP POST requests and executes encoded commands via a custom decoder.
There is no patch yet. In the meantime, Cisco is telling customers to lock these appliances down behind firewalls, restrict access to trusted hosts only, separate mail and management interfaces, disable HTTP on the main admin portal, restore devices to a known‑good configuration, and aggressively monitor web logs for weird or unexpected traffic patterns. The U.S. CISA has already shoved CVE-2025-20393 into its Known Exploited Vulnerabilities catalog and is forcing federal agencies to apply mitigations on an accelerated timeline.
If you’re a developer or engineering leader, this matters even if you’ve never touched a Cisco CLI. First, your “security appliances” are still just software, and this is yet another reminder that perimeter gear is high‑value, high‑risk code that needs the same scrutiny as your app stack. Second, email gateways often sit in front of identity flows and ticketing systems; if they get popped, attackers are a tiny pivot away from your internal tools, source repos, and CI/CD. Third, the toolset here—tunnels like Chisel and bespoke log scrubbers—shows how modern intrusions blend off‑the‑shelf utilities with custom implants, which is exactly the pattern you should be threat‑modeling against in your own infrastructure.
Practically, now’s the time to double‑check: are any of your “management” interfaces exposed to the internet, do you have inventory and ownership for every mail/security appliance, and can you rebuild them quickly from code instead of praying your backups aren’t already poisoned? Also, start treating appliance logs like app logs: centralize them, alert on anomalies, and don’t assume “it’s a box with a vendor logo, it’s fine.”
This zero‑day is a harsh reminder that the edge is fragile: if your email security box can become an attacker’s beachhead with a single input validation bug, then hardening, isolation, and rapid response plans aren’t “nice security extras”—they’re table stakes.

