China-linked APT UAT-9686 is targeting Cisco Secure Email Gateway and Secure Email and Web Manager
好的,我现在需要帮用户总结一篇文章的内容,控制在100字以内。首先,我得仔细阅读文章,理解其主要内容。 文章主要讲的是Cisco披露了一个零日漏洞CVE-2025-20393,这个漏洞存在于Secure Email Gateway和Secure Email/Web Manager中。一个与中国有关的APT组织UAT-9686正在利用这个漏洞进行攻击。攻击者通过远程命令执行漏洞,获得了root权限,并植入了持久性机制AquaShell,还使用了其他工具如AquaTunnel和AquaPurge来保持隐蔽和长期访问。 接下来,我需要将这些信息浓缩到100字以内。要抓住关键点:零日漏洞、受影响的产品、攻击者身份、利用方式、植入的工具以及影响范围。 可能的结构是:首先说明Cisco披露了什么,然后指出攻击者是谁,接着描述他们如何利用漏洞以及采取的措施,最后提到只有非标准配置受影响。 现在组织语言:Cisco披露了零日漏洞CVE-2025-20393,影响Secure Email Gateway和Manager。中国关联的APT UAT-9686利用此漏洞进行攻击,获取root权限并植入AquaShell等工具。攻击仅影响非标准配置设备。 检查字数是否在限制内,并确保信息准确无误。 </think> Cisco披露了针对Secure Email Gateway和Secure Email/Web Manager的零日漏洞CVE-2025-20393,被中国关联的APT UAT-9686利用。攻击者通过远程命令执行获取root权限,并植入持久性机制AquaShell等工具。仅非标准配置设备受影响。 2025-12-19 08:53:41 Author: securityaffairs.com(查看原文) 阅读量:14 收藏

China-linked APT UAT-9686 is targeting Cisco Secure Email Gateway and Secure Email and Web Manager

Pierluigi Paganini December 19, 2025

Cisco disclosed a critical zero-day (CVE-2025-20393) in Secure Email Gateway and Secure Email and Web Manager, actively exploited by a China-linked group.

Cisco disclosed a critical zero-day, tracked as CVE-2025-20393, in Secure Email Gateway and Secure Email/Web Manager, which is actively exploited by a China-linked threat group.

Cisco reported a December 10 campaign targeting certain Secure Email Gateway appliances with exposed ports, enabling attackers to run root-level commands and plant persistence mechanisms. Threat actors exploited a Remote Command Execution Vulnerability, tracked as CVE-2025-20393, in Cisco Secure Email Gateway and Cisco Secure Email and Web Manager.

“On December 10, Cisco became aware of a new cyberattack campaign targeting a limited subset of appliances with certain ports open to the internet that are running Cisco AsyncOS Software for Cisco Secure Email Gateway and Cisco Secure Email and Web Manager.” reads the advisory. “This attack allows the threat actors to execute arbitrary commands with root privileges on the underlying operating system of an affected appliance. The ongoing investigation has revealed evidence of a persistence mechanism planted by the threat actors to maintain a degree of control over compromised appliances.”

The exploitation of CVE-2025-20393 was discovered by Cisco’s own Talos security experts. The attacks have been aimed at “a limited subset of appliances with certain ports open to the internet”. 

Cisco Talos researchers uncovered a campaign targeting Cisco AsyncOS on Secure Email Gateway (ESA) and Secure Email and Web Manager (SMA) appliances. The experts linked, with moderate confidence, the activity to a China-linked APT tracked as UAT-9686, based on tooling and infrastructure overlaps with other China-nexus APTs. The attackers deploy a custom persistence mechanism dubbed “AquaShell,” alongside tools for reverse tunneling and log deletion to maintain stealth and long-term access.

“Cisco Talos is tracking the active targeting of Cisco AsyncOS Software for Cisco Secure Email Gateway, formerly known as Cisco Email Security Appliance (ESA), and Cisco Secure Email and Web Manager, formerly known as Cisco Content Security Management Appliance (SMA), enabling attackers to execute system-level commands and deploy a persistent Python-based backdoor, AquaShell.” states Cisco Talos. “Cisco became aware of this activity on December 10, which has been ongoing since at least late November 2025. Additional tools observed include AquaTunnel (reverse SSH tunnel), chisel (another tunneling tool), and AquaPurge (log-clearing utility).”

Analysis shows that only appliances running non-standard configurations, as outlined in Cisco’s advisory, have been compromised, suggesting misconfigurations play a key role in exposure.

AquaShell is a lightweight Python backdoor embedded in a Cisco AsyncOS web server file that executes encoded shell commands sent via unauthenticated HTTP POST requests. It’s installed by decoding a data blob into a modified index.py. Attackers used AquaPurge to erase traces by removing specific keywords from log files. AquaTunnel, a Go-based ReverseSSH variant, allows attackers to establish persistent reverse SSH access to attacker servers, while Chisel enables HTTP-based tunneling to proxy traffic and pivot from compromised appliances into internal networks.

Cisco shared indicators of compromise (IoCs) for this campaign.

This week, U.S. Cybersecurity and Infrastructure Security Agency (CISA) added the zero-day Cisco to its Known Exploited Vulnerabilities catalog.

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, Cisco)




文章来源: https://securityaffairs.com/185861/apt/china-linked-apt-uat-9686-is-targeting-cisco-secure-email-gateway-and-secure-email-and-web-manager.html
如有侵权请联系:admin#unsafe.sh