FindArticles FindArticles
  • News
  • Technology
  • Business
  • Entertainment
  • Science & Health
  • Knowledge Base
FindArticlesFindArticles
Font ResizerAa
Search
  • News
  • Technology
  • Business
  • Entertainment
  • Science & Health
  • Knowledge Base
Follow US
  • Contact Us
  • About Us
  • Write For Us
  • Privacy Policy
  • Terms of Service
FindArticles © 2025. All Rights Reserved.
FindArticles > News > Technology

A knock‑on for hundreds of Cisco customers in Chinese campaign

Gregory Zuckerman
Last updated: December 19, 2025 9:05 pm
By Gregory Zuckerman
Technology
7 Min Read
SHARE

Security researchers are warning that hundreds of companies running Cisco’s email security device may be vulnerable to an actively exploited vulnerability that has been linked to a Chinese state-sponsored hacking campaign, which evidence shows is targeting exposed systems. The campaign exploits a recently discovered zero‑day that is being tracked as CVE‑2025-20393 and impacting Cisco Secure Email Gateway and Secure Email and Web Manager appliances.

Cisco verifies in-the-wild exploitation and has attributed the activity to China‑nexus operators via its Talos threat intelligence group. Though the company has not specified the number of victims, independent internet‑scanning groups report that the exposed attack surface is large enough to imperil hundreds of customers — even if current activity continues to appear selective.

Table of Contents
  • Targeted Exploitation of a New Cisco Zero‑Day
  • What Makes Email Security Appliances So Attractive
  • Who Is Most at Risk Right Now from This Campaign
  • No Patch Is Available: What Defenders Can Do
  • Potential impact and what’s next for defenders
A diagram illustrating the process of Cisco Secure Email with Microsoft 365, showing how an email with an attachment is scanned, delivered, and then remediated if a retrospective verdict changes the files disposition to malicious.

Targeted Exploitation of a New Cisco Zero‑Day

The vulnerability allows attackers to gain unauthorized control of vulnerable systems under certain conditions. According to Cisco’s warning, systems are only vulnerable if they are accessible from the internet and the “spam quarantine” feature is activated — neither setting is enabled by default. This may explain why exploitation seems targeted rather than random.

Shadowserver, which monitors global exposure, is mapping out the population of internet-facing devices at risk from CVE‑2025-20393 and reports active exposure in a range of locations including significant hotspots in India, Thailand, and the US. One of the products, email gateways by Cisco, was found being used in 220 internet‑exposed devices on public networks, according to Censys, a company that maps out services on the public internet — an indication of how far these machines are from attackers looking to test them.

These tallies represent only the hosts that were visible on the open internet at the time, researchers stress. A number of organizations run hybrid deployments or can be served by a managed service provider, so the actual number of at‑risk organizations could be greater than what scanning alone uncovers.

What Makes Email Security Appliances So Attractive

Email gateways are a strategic choke point that hackers can use to intercept messages, collect credentials, and pivot deeper into the network. Unlike endpoints, security appliances do not always receive full endpoint detection coverage and often are deprioritized in patch pipelines, which makes them interesting targets for advanced persistent threat actors.

China-aligned groups have hit perimeter and messaging infrastructure time after time; a trend that has been observed in previous intrusions into email security and VPN products from multiple vendors. The playbook is always the same: leverage a new or recently discovered vulnerability, gain discreet persistence into the appliance, and exfiltrate data or credential holders over time.

Who Is Most at Risk Right Now from This Campaign

For example, organizations with the Cisco Secure Email Gateway or Secure Email and Web Manager using the spam quarantine feature available through a public internet connection are most at risk. The most common adopters are corporations, government organizations, universities, and ISPs that send a lot of mail using these systems as delivery services.

A diagram illustrating the Cisco Secure Email Encryption Service, showing an email being sent from a laptop, encrypted, and then delivered to various devices via a cloud service.

The geographic distribution is underscored by Shadowserver’s telemetry, which reveals dozens of exposed systems in critical countries. A small number of insecure gateways may even represent downstream risk disproportionately, as a single breached device can net attackers with wide visibility and privileged access to your mail flow across an entire organization.

No Patch Is Available: What Defenders Can Do

Cisco has not issued patches for CVE‑2025-20393 yet. The company’s advice is unusually direct: if you believe or know that your device has been compromised, wipe it and restore to the state that you’re confident works. Talos cautions that at this time, rebuilding is the only certain means of eradicating the threat actor’s persistence mechanisms.

In the meantime, defenders should not delay hardening:

  • Block internet‑accessible traffic for the affected products if possible.
  • Disable the spam quarantine feature.
  • Enforce IP allowlists and strong authentication on management interfaces.
  • Increase monitoring to include alerting on suspicious behavior.
  • Baseline outbound traffic from these appliances and observe anomalous connections as potential signs of data exfiltration.

Security leads also need to check the Cisco advisory and Talos analysis for detection recommendations and indicators, work with email and SOC teams to search for any suspicious quarantine activity or admin changes that should not have been made, and verify a clean backup before executing a rebuild of any systems.

Potential impact and what’s next for defenders

The behavioral effects of a successful intrusion can be dramatic: maildir takeover via credential harvesting, tampering with the routing of emails, installing new implants, and laterally spreading toward domain controllers or identity providers. These devices are used to process sensitive communications, so even just partial access can be a source of valuable intelligence for espionage‑minded threat actors.

Anticipate further reconnaissance against vulnerable Cisco gateways as attackers look for high‑payoff targets while patches are not yet available. Those that can quickly minimize their internet footprint and validate quarantine features will vastly decrease the attack base. Consider placing these appliances behind a reverse proxy or VPN, and move quarantine functionality off internet‑reachable interfaces until patches are available.

This campaign is a clear indication that “security of the security stack” is now a board‑level concern. Inventory your edge appliances, reduce endpoints that are internet exposed, and scope email security infrastructure as aggressively as you do identity and network perimeter systems. As the situation progresses, you may want to monitor resources from Cisco, Talos, Shadowserver, Censys, and government partners like CISA, who may release additional mitigations or detection signatures.

Gregory Zuckerman
ByGregory Zuckerman
Gregory Zuckerman is a veteran investigative journalist and financial writer with decades of experience covering global markets, investment strategies, and the business personalities shaping them. His writing blends deep reporting with narrative storytelling to uncover the hidden forces behind financial trends and innovations. Over the years, Gregory’s work has earned industry recognition for bringing clarity to complex financial topics, and he continues to focus on long-form journalism that explores hedge funds, private equity, and high-stakes investing.
Latest News
Yann LeCun Launches AMI Labs With $5B Valuation
$100 DoorDash eGift card drops to $85 in a limited time offer
HBO Max adds Ne Zha II and a Wiggles behind-the-scenes doc
Disney+ and Hulu Premiere Made In Korea, Gumball and Strange Harvest
Apple To Unveil Foldable iPhone In 2026 After Delays
Amazon Acknowledges Yearslong Russian Cyberattack on AWS
Netflix Leads With The Great Flood, Eden, and Stranger Things
TikTok Awards Stumble in Debut U.S. Show
Amazon Launches Super Saturday Sale With Up To 50% Off Gifts
Readers Pick Galaxy S25 Ultra as Best Phone of 2025
Netflix Bets On Podcasts With Daytime Talk Show
Ryzen 7 5800X3D pricing has surpassed the 9800X3D
FindArticles
  • Contact Us
  • About Us
  • Write For Us
  • Privacy Policy
  • Terms of Service
  • Corrections Policy
  • Diversity & Inclusion Statement
  • Diversity in Our Team
  • Editorial Guidelines
  • Feedback & Editorial Contact Policy
FindArticles © 2025. All Rights Reserved.