Close Menu
    Latest Post

    Is ChatGPT’s New Shopping Research Solving a Problem, or Creating One?

    January 9, 2026

    How GitHub Engineers Address Platform Challenges

    January 9, 2026

    Key CSS Developments: Conditional View Transitions, Text Effects, and Community Insights

    January 9, 2026
    Facebook X (Twitter) Instagram
    Trending
    • Is ChatGPT’s New Shopping Research Solving a Problem, or Creating One?
    • How GitHub Engineers Address Platform Challenges
    • Key CSS Developments: Conditional View Transitions, Text Effects, and Community Insights
    • As RAM prices skyrocket and Windows 11 flounders, Linux gains native NVIDIA GeForce NOW support — turning the cloud into a sanctuary for priced-out gamers
    • Honor Magic 8 Pro: A Contender in the Flagship Smartphone Arena
    • United States Withdraws from International Cybersecurity Organizations
    • Lego Introduces Tech-Enhanced Smart Bricks Amidst Expert Concerns
    • Build Resilient Generative AI Agents
    Facebook X (Twitter) Instagram Pinterest Vimeo
    NodeTodayNodeToday
    • Home
    • AI
    • Dev
    • Guides
    • Products
    • Security
    • Startups
    • Tech
    • Tools
    NodeTodayNodeToday
    Home»Security»Cisco customers hit by fresh wave of zero-day attacks from China-linked APT
    Security

    Cisco customers hit by fresh wave of zero-day attacks from China-linked APT

    Samuel AlejandroBy Samuel AlejandroDecember 21, 2025Updated:December 22, 2025No Comments3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    src 9xkzq0 featured
    BARCELONA, SPAIN - FEBRUARY 28: A logo sits illuminated outside the Cisco booth at the SK telecom booth on day 1 of the GSMA Mobile World Congress on February 28, 2022 in Barcelona, Spain. The annual Mobile World Congress hosts some of the world's largest communications companies, with many unveiling their latest phones and wearables gadgets like foldable screens. (Photo by David Ramos/Getty Images)
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Cisco logo sits illuminated at MWC Barcelona on February 28, 2022. (David Ramos/Getty Images)

    Cisco customers are currently facing a new series of attacks from a Chinese threat group. This group has been actively exploiting a critical zero-day vulnerability in Cisco’s email and web security software since at least late November, as detailed in a recent advisory.

    Cisco became aware of these attacks on December 10. The vulnerability, identified as CVE-2025-20393, carries a CVSS rating of 10. It is an improper input validation flaw within Cisco AsyncOS software for Cisco Secure Email Gateway and Cisco Secure Email and Web Manager. This flaw enables attackers to execute commands with unrestricted privileges and install persistent backdoors on affected devices.

    A patch for this vulnerability is not yet available, and Cisco has not provided a timeline for its release. Cisco noted that “non-standard configurations” were observed in compromised networks, specifically customer systems configured with a publicly exposed spam quarantine feature.

    Cisco Talos researchers have attributed these attacks to a Chinese advanced persistent threat (APT) group tracked as UAT-9686. The group’s tools and infrastructure are consistent with those used by other China state-sponsored threat groups, such as APT41 and UNC5174.

    Cisco did not disclose the number of customers affected by these attacks. The company advises customers to consult its advisory for guidance on determining exposure and implementing mitigation steps, including isolating or rebuilding affected systems.

    The spam quarantine feature, which must be enabled and publicly exposed for the vulnerability to be exploited, is not activated by default. The Cybersecurity and Infrastructure Security Agency (CISA) added this zero-day to its known exploited vulnerabilities catalog.

    Douglas McKee, director of vulnerability intelligence at Rapid7, commented that highlighting non-standard configurations provides relevant technical detail for defenders to assess exploitation likelihood. However, he emphasized that the core issue remains a vendor’s responsibility to fix, as secure design should account for edge cases.

    Dustin Childs, head of threat awareness at Trend Micro’s Zero Day Initiative, suggested that the specific configurations required for exploitation indicate targeted attacks. The number of Cisco customers who have enabled and exposed the spam quarantine feature to the internet remains unknown.

    Chinese threat groups have a history of exploiting Cisco vulnerabilities. These latest attacks follow a widespread campaign involving actively exploited zero-day vulnerabilities affecting Cisco firewalls.

    Federal cyber authorities issued an emergency directive in September concerning the earlier firewall attacks, which impacted several government agencies in May. At that time, CISA and Cisco did not fully explain the four-month delay between the initial response to the attacks and the disclosure, patching of zero-days, and issuance of the emergency directive.

    A Cisco spokesperson stated that there is no evidence linking the current attacks to the earlier incidents this year. Cisco had attributed the previous attacks to the same threat group responsible for an early 2024 campaign targeting Cisco devices, which was named “ArcaneDoor.”

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleCongressional Concerns Rise Over Broadened US Wiretapping Authority
    Next Article Startups need dual theories on distribution and product/market fit. One is not enough
    Samuel Alejandro

    Related Posts

    Security

    United States Withdraws from International Cybersecurity Organizations

    January 9, 2026
    Security

    Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill

    January 8, 2026
    Security

    KrebsOnSecurity.com Marks 16 Years of Cybersecurity Reporting

    January 7, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Latest Post

    ChatGPT Mobile App Surpasses $3 Billion in Consumer Spending

    December 21, 202512 Views

    Automate Your iPhone’s Always-On Display for Better Battery Life and Privacy

    December 21, 202510 Views

    Creator Tayla Cannon Lands $1.1M Investment for Rebuildr PT Software

    December 21, 20259 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    About

    Welcome to NodeToday, your trusted source for the latest updates in Technology, Artificial Intelligence, and Innovation. We are dedicated to delivering accurate, timely, and insightful content that helps readers stay ahead in a fast-evolving digital world.

    At NodeToday, we cover everything from AI breakthroughs and emerging technologies to product launches, software tools, developer news, and practical guides. Our goal is to simplify complex topics and present them in a clear, engaging, and easy-to-understand way for tech enthusiasts, professionals, and beginners alike.

    Latest Post

    Is ChatGPT’s New Shopping Research Solving a Problem, or Creating One?

    January 9, 20260 Views

    How GitHub Engineers Address Platform Challenges

    January 9, 20260 Views

    Key CSS Developments: Conditional View Transitions, Text Effects, and Community Insights

    January 9, 20260 Views
    Recent Posts
    • Is ChatGPT’s New Shopping Research Solving a Problem, or Creating One?
    • How GitHub Engineers Address Platform Challenges
    • Key CSS Developments: Conditional View Transitions, Text Effects, and Community Insights
    • As RAM prices skyrocket and Windows 11 flounders, Linux gains native NVIDIA GeForce NOW support — turning the cloud into a sanctuary for priced-out gamers
    • Honor Magic 8 Pro: A Contender in the Flagship Smartphone Arena
    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions
    • Disclaimer
    • Cookie Policy
    © 2026 NodeToday.

    Type above and press Enter to search. Press Esc to cancel.