Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New Tool Released to Detect Cisco Secure Email Gateway 0-Day Vulnerability Exploited in the Wild

New Tool Released to Detect Cisco Secure Email Gateway 0-Day Vulnerability Exploited in the Wild

Posted on December 19, 2025December 19, 2025 By CWS

A light-weight Python script to assist organizations rapidly establish publicity to CVE-2025-20393, a crucial zero-day vulnerability in Cisco Safe Electronic mail Gateway (SEG) and Safe Malware Analytics (SMA), also referred to as Cisco Safe Electronic mail and Net Supervisor.

The instrument “Cisco SMA Publicity Test” detects open ports and providers which have been exploited in current assaults, as detailed in Cisco’s advisory.

Developed by GitHub person StasonJatham and launched publicly at present, the script targets indicators of compromise tied to the flaw, which permits unauthenticated distant attackers to execute arbitrary code by way of uncovered administration and quarantine interfaces.

Attackers have weaponized ports like TCP 82, 83, 443, 8080, 8443, and 9443 for admin entry, alongside quarantine endpoints on 6025, 82, 83, 8443, and 9443.

The instrument scans these, performs HTTP/S fingerprinting (server headers, standing codes, redirects, auth realms, Cisco-specific key phrases, and model patterns), and checks widespread paths corresponding to /quarantine, /spamquarantine, /spam, /sma-login, and /login.

It additionally grabs uncooked socket banners and flags indicators of lively exploitation, together with strings like “AquaShell,” “AquaTunnel,” “Chisel,” and “AquaPurge” – hallmarks of post-compromise instruments noticed within the wild.

Easy Deployment, No Dependencies

Requiring solely Python 3’s commonplace library, the script runs in seconds:

textpython3 cisco-sa-sma-attack-N9bf4.py [-v] [-t ]

-v: Verbose mode reveals all checks.

-t: Customized timeout (default: fast probes).

Helps domains or direct IPs (bypasses DNS).

Port TypeExposed PortsRisk LevelAdmin/Mgmt82, 83, 443, 8080, 8443, 9443CriticalQuarantine/Spam6025, 82, 83, 8443, 9443High

Outcomes flag weak configs, enabling admins to firewall ports, apply Cisco patches, or isolate programs urgently.

Cisco’s advisory warns of lively exploitation, urging instant mitigation. With no CVSS rating revealed but, the vulnerability’s unauthenticated RCE potential echoes previous SMA flaws.

This instrument fills a detection hole, empowering SecOps groups sans industrial scanners. StasonJatham stresses accountable use: “Solely take a look at licensed programs.”

Comply with us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:0Day, Cisco, Detect, Email, Exploited, Gateway, Released, Secure, Tool, Vulnerability, Wild

Post navigation

Previous Post: WatchGuard Warns of Active Exploitation of Critical Fireware OS VPN Vulnerability
Next Post: ‘Kimwolf’ Android Botnet Ensnares 1.8 Million Devices

Related Posts

Crypto Scams Surge in Asia with Sophisticated Tactics Crypto Scams Surge in Asia with Sophisticated Tactics Cyber Security News
Critical Update for SolarWinds Serv-U: Prevent Root Access Threat Critical Update for SolarWinds Serv-U: Prevent Root Access Threat Cyber Security News
Two U.S. CyberSecurity Pros Plead Guilty for Working as ALPHV/BlackCat Affiliates Two U.S. CyberSecurity Pros Plead Guilty for Working as ALPHV/BlackCat Affiliates Cyber Security News
Google Rolls Out Long-Awaited @gmail.com Email Change Feature for Users Google Rolls Out Long-Awaited @gmail.com Email Change Feature for Users Cyber Security News
Google Chrome 0-Day Vulnerability Actively Exploited in the Wild Google Chrome 0-Day Vulnerability Actively Exploited in the Wild Cyber Security News
New ClickFix Campaign Hijacks Facebook Sessions Using Fake Verification Pages New ClickFix Campaign Hijacks Facebook Sessions Using Fake Verification Pages Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • F5 Resolves Over 50 Security Flaws in Software
  • Windows Vulnerabilities: BitLocker Bypass and CTFMON Exploit
  • Seedworm Group Exploits Signed Binaries for Cyber Attacks
  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • F5 Resolves Over 50 Security Flaws in Software
  • Windows Vulnerabilities: BitLocker Bypass and CTFMON Exploit
  • Seedworm Group Exploits Signed Binaries for Cyber Attacks
  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark