Cisco AsyncOS 0-Day Vulnerability Exploited in the Wild to run System-level Commands


An active campaign exploiting a zero-day vulnerability in Cisco AsyncOS Software, targeting Secure Email Gateway (formerly Email Security Appliance, ESA) and Secure Email and Web Manager (formerly Content Security Management Appliance, SMA).

The attack, spotted since late November 2025 and publicly disclosed on December 10, allows attackers to run system-level commands and plant a persistent Python backdoor dubbed “AquaShell.”

Talos attributes the operation with moderate confidence to UAT-9686, a Chinese-nexus advanced persistent threat (APT) actor. Overlaps in tactics, techniques, procedures (TTPs), tooling, and infrastructure link UAT-9686 to groups like APT41 and UNC5174.

Notably, the custom web implant AquaShell mirrors techniques adopted by sophisticated Chinese APTs for stealthy persistence.

The intrusion vector hits appliances with non-standard configurations, as detailed in Cisco’s advisory. Attackers embed AquaShell into “/data/web/euq_webui/htdocs/index.py” via an encoded blob. This lightweight backdoor passively monitors for unauthenticated HTTP POST requests, decodes payloads with a custom algorithm plus Base64, and executes shell commands.

Compromise escalates with supplementary tools: AquaTunnel, a GoLang ELF binary forked from open-source ReverseSSH, establishes reverse SSH tunnels for remote access past firewalls; Chisel, an open-source tunneler, proxies TCP/UDP traffic over HTTP for internal pivoting; and AquaPurge, which scrubs logs by filtering out keyword-laden lines via egrep.

google

The Secure Email and Web Manager centralizes oversight of the ESA and Web Security Appliance (WSA), including quarantine, policies, and reporting, making it a prime target for email gateway disruptions.

Cisco urges customers to review the advisory for indicators of compromise (IOCs) and remediation.

Tool/ComponentTypeValueDescription ​
AquaTunnelSHA256 Hash2db8ad6e0f43e93cc557fbda0271a436f9f2a478b1607073d4ee3d20a87ae7efGoLang ELF reverse SSH tunnel for remote access.
AquaPurgeSHA256 Hash145424de9f7d5dd73b599328ada03aa6d6cdcee8d5fe0f7cb832297183dbe4caLog-clearing utility using egrep to remove keywords.
ChiselSHA256 Hash85a0b22bd17f7f87566bd335349ef89e24a5a19f899825b4d178ce6240f58bfcOpen-source tunneling tool for TCP/UDP proxying over HTTP.
Attacker IPIP Address172.233.67[.]176Command-and-control infrastructure.
Attacker IPIP Address172.237.29[.]147Command-and-control infrastructure.
Attacker IPIP Address38.54.56[.]95Command-and-control infrastructure.

This campaign underscores rising APT focus on email security edges amid supply chain risks.

Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

googlenews



Source link