Executive Summary
In late November 2025, Cisco discovered a major cybersecurity incident involving active exploitation of an unpatched zero-day vulnerability (CVE-2025-20393) in its AsyncOS operating system, impacting Secure Email Gateway (SEG) and Secure Email and Web Manager (SEWM) appliances. The flaw, leveraged exclusively on internet-facing appliances with non-standard configurations, enables remote code execution as root when the Spam Quarantine feature is exposed. Attribution points to UAT-9686, a Chinese-nexus advanced persistent threat actor, utilizing malware such as AquaShell, AquaTunnel, Chisel, and AquaPurge for backdoor access, lateral movement, and log deletion. The campaign has resulted in persistent compromise, requiring full appliance rebuilds for remediation.
This incident underscores the persisting risk that unpatched zero-days pose to enterprise infrastructure, particularly from advanced threat actors using sophisticated malware implant chains. It illustrates a broader industry trend of increasingly swift exploitation of newly discovered vulnerabilities and public toolkits by nation-state actors.
Why This Matters Now
The ongoing attacks against Cisco SEG and SEWM appliances highlight the urgent need for organizations to review and restrict access to critical email infrastructure. With no vendor patch available, exposure to active exploitation by advanced threat actors makes prompt segmentation, access controls, and continuous monitoring essential to prevent widespread compromise.
Attack Path Analysis
The attackers exploited an exposed Cisco AsyncOS (SEG/SEWM) zero-day (CVE-2025-20393) by accessing Internet-facing Spam Quarantine services, gaining initial access and executing commands with root privileges. They then escalated privileges using the exploit for arbitrary command execution, allowing installation of persistence mechanisms. Using tools such as AquaTunnel and Chisel, attackers laterally moved within the environment, potentially pivoting between appliances. Reverse SSH tunnels established command and control channels to remote infrastructure to orchestrate operations and maintain access. Some attacker tooling focused on enabling covert exfiltration of data and credentials east-west or out to the Internet. To maintain stealth and hamper investigations, the threat actors deployed AquaPurge log-clearing tools to cover their tracks and persist within the environment.
Kill Chain Progression
Initial Compromise
Description
The adversary scanned for and accessed Internet-exposed Spam Quarantine interfaces on Cisco SEG/SEWM appliances, and exploited CVE-2025-20393 to gain a foothold.
Related CVEs
CVE-2025-20393
CVSS 10A vulnerability in Cisco AsyncOS Software for Cisco Secure Email Gateway and Cisco Secure Email and Web Manager allows unauthenticated, remote attackers to execute arbitrary commands with root privileges on affected appliances.
Affected Products:
Cisco Secure Email Gateway – AsyncOS
Cisco Secure Email and Web Manager – AsyncOS
Exploit Status:
exploited in the wild
MITRE ATT&CK® Techniques
Exploit Public-Facing Application
User Execution
Command and Scripting Interpreter
Event Triggered Execution
Hijack Execution Flow
Proxy
Indicator Removal on Host
Valid Accounts
Potential Compliance Exposure
Mapping incident impact across multiple compliance frameworks.
PCI DSS 4.0 – Restrict Access to System Components and Data
Control ID: 7.2.5
NYDFS 23 NYCRR 500 – Access Privileges
Control ID: 500.07
CISA Zero Trust Maturity Model 2.0 – Monitor and Analyze Authentication Events
Control ID: Pillar 2: Identity: Visibility and Analytics
DORA (Digital Operational Resilience Act) – ICT Risk Management Framework
Control ID: Article 9(2)
NIS2 Directive – Incident Handling and Operational Continuity
Control ID: Article 21(2)(c)
Sector Implications
Industry-specific impact of the vulnerabilities, including operational, regulatory, and cloud security risks.
Government Administration
Critical exposure to Chinese APT attacks through email security infrastructure, requiring immediate AsyncOS patching and enhanced threat detection capabilities.
Financial Services
High-value targets for state-sponsored espionage via compromised Cisco email gateways, demanding zero trust segmentation and encrypted traffic monitoring.
Health Care / Life Sciences
Patient data at risk from unpatched Cisco AsyncOS vulnerabilities enabling lateral movement and compliance violations under HIPAA regulations.
Defense/Space
Mission-critical systems vulnerable to Chinese threat actors exploiting email appliances for persistent backdoor access and intelligence gathering operations.
Sources
- Cisco warns of unpatched AsyncOS zero-day exploited in attackshttps://www.bleepingcomputer.com/news/security/cisco-warns-of-unpatched-asyncos-zero-day-exploited-in-attacks/Verified
- Reports About Cyberattacks Against Cisco Secure Email Gateway And Cisco Secure Email and Web Managerhttps://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sma-attack-N9bf4Verified
- CVE-2025-20393 Detailhttps://nvd.nist.gov/vuln/detail/CVE-2025-20393Verified
- UAT-9686 actively targets Cisco Secure Email Gateway and Secure Email and Web Managerhttps://blog.talosintelligence.com/uat-9686/Verified
Frequently Asked Questions
Cloud Native Security Fabric Mitigations and ControlsCNSF
Implementing network segmentation, east-west traffic controls, egress policy enforcement, and visibility provided by CNSF-aligned Zero Trust capabilities would have constrained the attacker's ability to exploit exposed appliances, pivot laterally, establish command and control, and exfiltrate data. Inline threat detection and enforcement could have blocked known malicious traffic or signatures indicative of attacker tools.
Control: Cloud Firewall (ACF)
Mitigation: Inbound traffic to vulnerable ports/services would be blocked from untrusted sources.
Control: Threat Detection & Anomaly Response
Mitigation: Anomalous privilege escalation and unauthorized process creation would be detected and alerted.
Control: East-West Traffic Security
Mitigation: Lateral movement using non-standard or suspicious traffic would be isolated and blocked.
Control: Egress Security & Policy Enforcement
Mitigation: Outbound connections to attacker-controlled infrastructure are detected, controlled, or blocked.
Control: Encrypted Traffic (HPE)
Mitigation: Data in transit is inspected or controlled, and suspicious exfiltration via encrypted channels is flagged.
Centralized visibility detects abnormal activity and gaps, enabling quicker forensic response.
Impact at a Glance
Affected Business Functions
- Email Communication
- Web Management
Estimated downtime: 5 days
Estimated loss: $500,000
Potential exposure of sensitive email communications and administrative credentials due to unauthorized access.
Recommended Actions
Key Takeaways & Next Steps
- • Restrict Internet exposure of management interfaces and enforce least-privilege access using Zero Trust segmentation controls.
- • Deploy inbound and outbound firewall policies (ACF) to block unauthorized access and control both ingress and egress traffic.
- • Implement east-west segmentation and internal traffic inspection to contain possible lateral movement and detect anomalous flows between workloads.
- • Leverage continuous threat detection and anomaly response for timely detection of privilege escalation and runtime persistence techniques.
- • Maintain centralized visibility and secure log retention across cloud and appliance environments to rapidly identify, investigate, and recover from malicious activity.



