Technology NewsTechnology NewsTechnology News
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Reading: Cisco Faces New Zero-Day Attacks as Chinese Group Targets Email Security
Share
Font ResizerAa
Technology NewsTechnology News
Font ResizerAa
Search
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Follow US
  • Cookie Policy (EU)
  • Contact
  • About
© 2025 NEWSLINKER - Powered by LK SOFTWARE
Cybersecurity

Cisco Faces New Zero-Day Attacks as Chinese Group Targets Email Security

Highlights

  • Cisco faces zero-day attacks exploited by Chinese group UAT-9686.

  • No patch exists; vulnerability impacts Secure Email Gateway products.

  • Non-standard spam quarantine settings contribute to attack risk.

Ethan Moreno
Last updated: 19 December, 2025 - 1:49 am 1:49 am
Ethan Moreno 3 weeks ago
Share
SHARE

Contents
What Makes CVE-2025-20393 a Priority Risk?How Are Customers and Authorities Responding?Why Is the Spam Quarantine Feature Relevant?

A new series of cyberattacks has emerged, targeting Cisco Secure Email Gateway and Cisco Secure Email and Web Manager products through a critical zero-day vulnerability. Organizations using Cisco products report increased concerns as attackers, identified as a Chinese threat group known as UAT-9686, exploit an unpatched software flaw. These incidents, starting from late November, have intensified anxiety about persistent backdoors and unauthorized system access, especially as the vendor has yet to provide a fix. Customers now weigh urgent mitigation strategies to protect business operations, all while facing uncertainty about the full scope of the attacks.

Earlier reports of vulnerabilities in Cisco network equipment indicated that Chinese state-linked groups like APT41 had previously targeted Cisco, often exploiting weaknesses for extended periods before discovery. Previous notification delays and the lack of immediate patching came under criticism, with discussions centering on the need for faster responses and full disclosure. Similar tactics were seen in recent attacks, again focusing on the exploitation of widely used Cisco security solutions, underlining challenges companies face in defending against well-resourced adversaries.

What Makes CVE-2025-20393 a Priority Risk?

The critical flaw, designated CVE-2025-20393, has received the highest CVSS rating of 10, indicating its potential to cause significant harm in affected environments. Attackers have gained unrestricted privileges on compromised systems, allowing for deep control and possible persistence. Cisco confirms that customer networks with publicly exposed spam quarantine features face heightened risk, emphasizing that such settings, while non-standard, are not uncommon among certain organizations.

How Are Customers and Authorities Responding?

Both Cisco and US cyber authorities are responding by urging customers to review their system configurations and follow mitigation recommendations. The Cybersecurity and Infrastructure Security Agency has added the recent zero-day to its list of known exploited vulnerabilities, signaling a need for organizations to prioritize checking and potentially isolating or rebuilding affected systems. Cisco has withheld information on the number of customers impacted, but has reiterated basic security steps as interim measures.

“We strongly encourage customers to monitor their configurations and follow our security advisories,”

a Cisco spokesperson stated.

Why Is the Spam Quarantine Feature Relevant?

The exploited vulnerability specifically targets systems with the spam quarantine feature activated and exposed to the internet—a setting not enabled by default. Investigations show attackers have focused on networks using this configuration, which allows them to access and manipulate critical infrastructure.

“Highlighting non-standard configurations isn’t the same as blaming users — it’s a relevant technical detail that helps defenders assess exploitation likelihood,”

said Douglas McKee from Rapid7, indicating that understanding these configurations is crucial for organizations under threat.

Recent events continue a pattern of aggressive targeting of major hardware and security vendors by Chinese-linked groups, who routinely search for vulnerable entry points and persist inside systems. The response showcases ongoing tension between rapid disclosure to inform users and the need to investigate breaches thoroughly before releasing details. Organizations adopting recommended hardening measures and regularly reviewing security advisories stand a better chance of detecting anomalies linked to zero-day exploitation. Learning from repeated incidents can improve resilience against future targeted attacks, especially when default and public configurations are involved.

You can follow us on Youtube, Telegram, Facebook, Linkedin, Twitter ( X ), Mastodon and Bluesky

You Might Also Like

Senators Urge Apple, Google to Remove X Over Grok AI Controversy

Vercel Teams Act Fast to Stop Massive React2Shell Security Threat

CrowdStrike Acquires SGNL to Tighten Identity Security in AI Era

US Law Experts Warn X Faces Deepfake Legal Backlash

Researchers Warn Organizations Patch Critical n8n Vulnerability Quickly

Share This Article
Facebook Twitter Copy Link Print
Ethan Moreno
By Ethan Moreno
Ethan Moreno, a 35-year-old California resident, is a media graduate. Recognized for his extensive media knowledge and sharp editing skills, Ethan is a passionate professional dedicated to improving the accuracy and quality of news. Specializing in digital media, Moreno keeps abreast of technology, science and new media trends to shape content strategies.
Previous Article RealMan Robotics Releases RealSource Dataset for Robotics Research
Next Article Chinese Hackers Use Anthropic’s Claude AI in Global Cyber Attack

Stay Connected

6.2kLike
8kFollow
2.3kSubscribe
1.7kFollow

Latest News

Kodiak and Bosch Expand Autonomous Truck Tech with Scalable Platform
Robotics
Leaders Use Storytelling to Build Trust in an A.I.-Driven World
AI Technology
Asus Sees Integrated Graphics Surpassing Discrete GPUs Soon
Computing
Nvidia Targets GTA 6 PC Launch Timeline with RTX 60 GPUs
Computing
Musk’s Grokipedia Reaches 5.6M Articles, Edges Closer to Wikipedia
Electric Vehicle
NEWSLINKER – your premier source for the latest updates in ai, robotics, electric vehicle, gaming, and technology. We are dedicated to bringing you the most accurate, timely, and engaging content from across these dynamic industries. Join us on our journey of discovery and stay informed in this ever-evolving digital age.

ARTIFICAL INTELLIGENCE

  • Can Artificial Intelligence Achieve Consciousness?
  • What is Artificial Intelligence (AI)?
  • How does Artificial Intelligence Work?
  • Will AI Take Over the World?
  • What Is OpenAI?
  • What is Artifical General Intelligence?

ELECTRIC VEHICLE

  • What is Electric Vehicle in Simple Words?
  • How do Electric Cars Work?
  • What is the Advantage and Disadvantage of Electric Cars?
  • Is Electric Car the Future?

RESEARCH

  • Robotics Market Research & Report
  • Everything you need to know about IoT
  • What Is Wearable Technology?
  • What is FANUC Robotics?
  • What is Anthropic AI?
Technology NewsTechnology News
Follow US
About Us   -  Cookie Policy   -   Contact

© 2025 NEWSLINKER. Powered by LK SOFTWARE
Welcome Back!

Sign in to your account

Register Lost your password?