Cisco Patches AsyncOS Zero-Day Exploited by Chinese APT Since November
CVE-2025-20393 (CVSS 10.0) fixed after China-linked UAT-9686 deployed backdoors on Secure Email Gateway appliances.
Cisco released patches on January 16 for CVE-2025-20393, a maximum-severity zero-day vulnerability in AsyncOS that Chinese threat actors had been exploiting since November 2025 to deploy backdoors on Secure Email Gateway appliances.
Vulnerability Details
The vulnerability, carrying a CVSS score of 10.0, is a remote command execution flaw arising from insufficient validation of HTTP requests by the Spam Quarantine feature. It affects Cisco Secure Email Gateway, Cisco Secure Email, and Web Manager appliances when the Spam Quarantine feature is enabled and exposed to the internet.
Threat Actor Activity
Cisco Talos identified a Chinese threat group tracked as UAT-9686 behind the attacks. The group weaponized the vulnerability to deploy AquaShell persistent backdoors, AquaTunnel and Chisel reverse SSH tunnel implants, and a log-clearing tool named AquaPurge. These tools have been linked to other Chinese state-backed groups including UNC5174 and APT41.
Timeline
Exploitation began in late November 2025. Cisco became aware of the campaign on December 10, and CISA added the vulnerability to its Known Exploited Vulnerabilities catalog on December 17, ordering federal agencies to apply mitigations by December 24.
Remediation
Cisco Email Security Gateway appliances should be upgraded to AsyncOS v15.0.5-016 or later, 15.5.4-012 or later, or 16.0.4-016 or later. The fix addresses the vulnerability and clears persistence mechanisms installed by the attackers.
Related Articles
Cloudflare 2026 Threat Report: 230 Billion Daily Blocked Threats and the Rise of Credential Attacks
Cloudflare has published its inaugural annual threat report revealing the company blocks over 230 billion threats daily across 20% of global web traffic. DDoS attacks doubled year-over-year to 47.1 million incidents, with the largest reaching a record 31.4 Tbps, while bots now account for 94% of all login attempts.
HashiCorp Patches Consul Arbitrary File Read Vulnerability in Kubernetes Auth
HashiCorp has released emergency patches for Consul to address CVE-2026-2808, a medium-severity vulnerability allowing arbitrary file reads when Kubernetes authentication is enabled. The fix also adds HTTP server timeouts to prevent Slowloris denial-of-service attacks against Consul agent endpoints.
Let's Encrypt Now Issues Six-Day Certificates and IP Address Certificates via Certbot
Let's Encrypt and the EFF have announced support for six-day (160-hour) certificates and IP address certificates through Certbot 5.3 and 5.4. The ultra-short-lived certificates reduce the impact window of compromised keys by design, while IP address certificates enable HTTPS for services identified by address rather than hostname.