100+ Cisco Secure Email Devices Exposed to Zero‑Day Exploited in the Wild

100+ Cisco Secure Email Devices Exposed to Zero‑Day Exploited in the Wild

Security researchers have identified at least 120 Cisco Secure Email Gateway and Cisco Secure Email and Web Manager devices vulnerable to a critical zero-day flaw that attackers are actively exploiting in the wild.

The vulnerability, tracked as CVE-2025-20393, currently has no available patch, leaving organizations exposed to potential compromise.

According to threat intelligence from Shadowserver Foundation, the vulnerable devices represent a subset of more than 650 fingerprinted exposed Cisco email security appliances accessible over the internet.

The discovery raises significant concerns for organizations relying on these systems to filter malicious emails and protect their networks from phishing attacks and malware distribution.

CVE-2025-20393 targets Cisco’s email security infrastructure, which enterprises use to inspect incoming and outgoing email traffic for threats.

While specific technical details about the exploitation method remain limited to prevent widespread abuse, the confirmation of active exploitation indicates threat actors are already leveraging this weakness to compromise vulnerable systems.

google

Cisco has acknowledged the vulnerability and released a security advisory urging organizations to implement immediate defensive measures.

The networking giant recommends that affected customers review their security configurations and apply temporary mitigations until a permanent fix becomes available. Organizations can access detailed guidance through Cisco’s Security Advisory portal.

The situation highlights the ongoing challenges organizations face with zero-day vulnerabilities, particularly in critical infrastructure components like email gateways.

These devices sit at a crucial junction in enterprise networks, handling sensitive communications and serving as a primary defense against email-borne threats. A successful compromise could allow attackers to intercept confidential communications, deploy ransomware, or establish persistent network access.

Security teams managing Cisco Secure Email Gateway and Web Manager deployments should prioritize reviewing the advisory and implementing recommended countermeasures immediately.

Organizations should also monitor their systems for suspicious activity and consider temporarily restricting external access to these devices until patches become available.

The vendor has not provided a timeline for when a security update will be released, making interim protective measures essential for minimizing exposure to this actively exploited vulnerability.

Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

googlenews





Source link