Daily Tech News: December 20, 2025

Tech News Header

Cisco’s New CVSS 10.0 Email Zero‑Day: What Devs and Sec Teams Need to Do Now

Cisco has disclosed a max‑severity, actively exploited zero‑day in its AsyncOS software that powers Cisco Secure Email Gateway and Secure Email and Web Manager appliances. A China‑nexus APT group is using it in the wild to get root on internet‑exposed email security boxes.

The bug is tracked as CVE-2025-20393, rated CVSS 10.0, and comes down to improper input validation that lets attackers execute arbitrary commands with root privileges on the underlying OS. All releases of Cisco AsyncOS for both physical and virtual Secure Email Gateway and Secure Email and Web Manager appliances are affected, with exploitation observed at least since late November 2025.

Cisco says a China‑linked APT they label UAT-9686 is hitting a “limited subset” of appliances that have specific ports open to the public internet. Once in, the attackers are dropping tunneling tools like ReverseSSH / AquaTunnel, Chisel, and a log‑wiping utility dubbed AquaPurge, plus a lightweight Python backdoor called AquaShell that listens for crafted unauthenticated HTTP POST requests and executes encoded commands via a custom decoder.

There is no patch yet. In the meantime, Cisco is telling customers to lock these appliances down behind firewalls, restrict access to trusted hosts only, separate mail and management interfaces, disable HTTP on the main admin portal, restore devices to a known‑good configuration, and aggressively monitor web logs for weird or unexpected traffic patterns. The U.S. CISA has already shoved CVE-2025-20393 into its Known Exploited Vulnerabilities catalog and is forcing federal agencies to apply mitigations on an accelerated timeline.

If you’re a developer or engineering leader, this matters even if you’ve never touched a Cisco CLI. First, your “security appliances” are still just software, and this is yet another reminder that perimeter gear is high‑value, high‑risk code that needs the same scrutiny as your app stack. Second, email gateways often sit in front of identity flows and ticketing systems; if they get popped, attackers are a tiny pivot away from your internal tools, source repos, and CI/CD. Third, the toolset here—tunnels like Chisel and bespoke log scrubbers—shows how modern intrusions blend off‑the‑shelf utilities with custom implants, which is exactly the pattern you should be threat‑modeling against in your own infrastructure.

Practically, now’s the time to double‑check: are any of your “management” interfaces exposed to the internet, do you have inventory and ownership for every mail/security appliance, and can you rebuild them quickly from code instead of praying your backups aren’t already poisoned? Also, start treating appliance logs like app logs: centralize them, alert on anomalies, and don’t assume “it’s a box with a vendor logo, it’s fine.”

This zero‑day is a harsh reminder that the edge is fragile: if your email security box can become an attacker’s beachhead with a single input validation bug, then hardening, isolation, and rapid response plans aren’t “nice security extras”—they’re table stakes.

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>

Penetration Testing Services (Ethical Hacking)

Social Media

Most Popular

Tech News
mzeeshanzafar28@gmail.com

Daily Tech News: April 13, 2026

AI So Powerful It Can Hack Everything – And Its Makers Won’t Release It Anthropic just unveiled Claude Methos, a beast of an AI model that sniffs out vulnerabilities in every major OS and browser with simple prompts.[2][6] They’re not

Read More »
Tech News
mzeeshanzafar28@gmail.com

Daily Tech News: April 11, 2026

Critical Marimo Flaw Exploited Just Hours After Disclosure – Hackers Are Lightning Fast Now Security researchers disclosed a critical unauthenticated vulnerability in Marimo, a popular open-source Python notebook tool for data science and AI apps, only for hackers to weaponize

Read More »
Tech News
mzeeshanzafar28@gmail.com

Daily Tech News: April 10, 2026

CPUID Hacked: Hackers Poison CPU-Z and HWMonitor Downloads, Delivering Malware Straight to Devs’ Desktops Hackers breached CPUID’s API, hijacking download links for popular tools CPU-Z and HWMonitor to serve malware-laden executables instead of legit software.[3] This supply chain hit targets

Read More »
Tech News
mzeeshanzafar28@gmail.com

Daily Tech News: April 9, 2026

Russian Hackers Are Vacuuming Microsoft Office Tokens from 18,000+ Routers—No Malware Needed Russian military intelligence hackers, tracked as Forest Blizzard, are exploiting ancient router flaws to silently steal Microsoft Office authentication tokens from users across thousands of networks.[1] Black Lotus

Read More »
Get The LatestProject Details

See our Demo work ...

By Simply Clicking on click below:

Demo Work

On Key

Related Posts

Daily Tech News: April 5, 2026

<“ Claude’s Source Code Leak Just Turned Into a Critical Vulnerability—and It Happened in Days Anthropic had a catastrophically bad week. Within days of accidentally leaking Claude Code’s source code,

Read More »

Daily Tech News: April 1, 2026

<” Critical Cybersecurity Threat: TeamPCP’s Iran-Targeted Wiper Attack body { font-family: -apple-system, BlinkMacSystemFont, ‘Segoe UI’, Roboto, sans-serif; line-height: 1.6; color: #333; max-width: 800px; margin: 0 auto; padding: 20px; background: #f9f9f9;

Read More »