A vulnerability in the Spam Quarantine feature of Cisco AsyncOS Software for Cisco Secure Email Gateway and Cisco Secure Email and Web Manager could allow an unauthenticated, remote attacker to execute arbitrary system commands on an affected device with root privileges. This vulnerability is due to insufficient validation of HTTP requests by the Spam Quarantine feature. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with root privileges.
https://www.darkreading.com/endpoint-security/exploited-zero-day-flaw-cisco-uc-affect-millions
https://www.securityweek.com/hackers-targeting-cisco-unified-cm-zero-day/
https://thehackernews.com/2026/01/cisco-fixes-actively-exploited-zero-day.html
https://www.securityweek.com/cisco-patches-vulnerability-exploited-by-chinese-hackers/
https://thehackernews.com/2026/01/cisco-patches-zero-day-rce-exploited-by.html
https://www.theregister.com/2026/01/15/cisco_fixes_cve_2025_20393/
https://www.securityweek.com/china-linked-hackers-exploiting-zero-day-in-cisco-security-gear/
https://www.databreachtoday.com/chinese-hackers-targeting-cisco-email-gateways-a-30341
https://thehackernews.com/2025/12/cisco-warns-of-active-attacks.html
https://cyberscoop.com/cisco-zero-day-attacks-china-apt/
https://www.theregister.com/2025/12/17/attacks_pummeling_cisco_0day/
https://www.helpnetsecurity.com/2025/12/17/cisco-secure-email-cve-2025-20393/
Published: 2025-12-17
Updated: 2026-01-16
Known Exploited Vulnerability (KEV)
Base Score: 10
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
Severity: Critical
Base Score: 10
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Severity: Critical
EPSS: 0.04033
Tenable Research has classified this CVE under the following Vulnerability Watch classification, which includes active and historical (inactive) classifications. You can learn more about these classifications on our blog.
Vulnerability of Interest