Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Amazon Uncovers Attacks Exploited Cisco ISE and Citrix NetScaler as Zero-Day Flaws

Amazon Uncovers Attacks Exploited Cisco ISE and Citrix NetScaler as Zero-Day Flaws

Posted on November 12, 2025November 12, 2025 By CWS

Nov 12, 2025Ravie LakshmananNetwork Safety / Zero-Day
Amazon’s risk intelligence crew on Wednesday disclosed that it noticed a complicated risk actor exploiting two then-zero-day safety flaws in Cisco Id Service Engine (ISE) and Citrix NetScaler ADC merchandise as a part of assaults designed to ship {custom} malware.
“This discovery highlights the pattern of risk actors specializing in essential id and community entry management infrastructure – the programs enterprises depend on to implement safety insurance policies and handle authentication throughout their networks,” CJ Moses, CISO of Amazon Built-in Safety, stated in a report shared with The Hacker Information.

The assaults have been flagged by its MadPot honeypot community, with the exercise weaponizing the next two vulnerabilities –

CVE-2025-5777 or Citrix Bleed 2 (CVSS rating: 9.3) – An inadequate enter validation vulnerability in Citrix NetScaler ADC and Gateway that might be exploited by an attacker to bypass authentication. (Fastened by Citrix in June 2025)
CVE-2025-20337 (CVSS rating: 10.0) – An unauthenticated distant code execution vulnerability in Cisco Id Providers Engine (ISE) and Cisco ISE Passive Id Connector (ISE-PIC) that would enable a distant attacker to execute arbitrary code on the underlying working system as root. (Fastened by Cisco in July 2025)

Whereas each shortcomings have come underneath energetic exploitation within the wild, the report from Amazon sheds gentle on the precise nature of the assaults leveraging them.

The tech big stated it detected exploitation makes an attempt focusing on CVE-2025-5777 as a zero-day, and that additional investigation of the risk led to the invention of an anomalous payload aimed toward Cisco ISE home equipment by weaponizing CVE-2025-20337. The exercise is alleged to have culminated within the deployment of a {custom} net shell disguised as a professional Cisco ISE part named IdentityAuditAction.
“This wasn’t typical off-the-shelf malware, however fairly a custom-built backdoor particularly designed for Cisco ISE environments,” Moses stated.
The online shell comes fitted with capabilities to fly underneath the radar, working completely in reminiscence and utilizing Java reflection to inject itself into operating threads. It additionally registers as a listener to observe all HTTP requests throughout the Tomcat server and implements DES encryption with non-standard Base64 encoding to evade detection.
Amazon described the marketing campaign as indiscriminate, characterizing the risk actor as “extremely resourced” owing to its capability to leverage a number of zero-day exploits, both by possessing superior vulnerability analysis capabilities or having potential entry to private vulnerability info. On prime of that, using bespoke instruments displays the adversary’s information of enterprise Java functions, Tomcat internals, and the interior workings of Cisco ISE.
The findings as soon as once more illustrate how risk actors are persevering with to focus on community edge home equipment to breach networks of curiosity, making it essential that organizations restrict entry, by way of firewalls or layered entry, to privileged administration portals.
“The pre-authentication nature of those exploits reveals that even well-configured and meticulously maintained programs might be affected,” Moses stated. “This underscores the significance of implementing complete defense-in-depth methods and creating strong detection capabilities that may establish uncommon habits patterns.”

The Hacker News Tags:Amazon, Attacks, Cisco, Citrix, Exploited, Flaws, ISE, NetScaler, Uncovers, ZeroDay

Post navigation

Previous Post: New Phishing Attack Leverages Popular Brands to Harvest Login Credentials
Next Post: Virtual Event Today: CISO Forum 2025 Virtual Summit

Related Posts

New RCEs, Darknet Busts, Kernel Bugs & 25+ More Stories New RCEs, Darknet Busts, Kernel Bugs & 25+ More Stories The Hacker News
A Critical Part of Enterprise AI Governance A Critical Part of Enterprise AI Governance The Hacker News
New Osiris Ransomware Emerges as New Strain Using POORTRY Driver in BYOVD Attack New Osiris Ransomware Emerges as New Strain Using POORTRY Driver in BYOVD Attack The Hacker News
Deepfakes. Fake Recruiters. Cloned CFOs — Learn How to Stop AI-Driven Attacks in Real Time Deepfakes. Fake Recruiters. Cloned CFOs — Learn How to Stop AI-Driven Attacks in Real Time The Hacker News
X Warns Users With Security Keys to Re-Enroll Before November 10 to Avoid Lockouts X Warns Users With Security Keys to Re-Enroll Before November 10 to Avoid Lockouts The Hacker News
Hackers Use TikTok Videos to Distribute Vidar and StealC Malware via ClickFix Technique Hackers Use TikTok Videos to Distribute Vidar and StealC Malware via ClickFix Technique The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News