Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
100+ Cisco Secure Email Devices Exposed to Zero‑Day Exploited in the Wild

100+ Cisco Secure Email Devices Exposed to Zero‑Day Exploited in the Wild

Posted on December 21, 2025December 21, 2025 By CWS

Safety researchers have recognized at the least 120 Cisco Safe E mail Gateway and Cisco Safe E mail and Net Supervisor units susceptible to a important zero-day flaw that attackers are actively exploiting within the wild.

The vulnerability, tracked as CVE-2025-20393, presently has no accessible patch, leaving organizations uncovered to potential compromise.

Based on menace intelligence from Shadowserver Basis, the susceptible units signify a subset of greater than 650 fingerprinted uncovered Cisco e mail safety home equipment accessible over the web.

The invention raises vital issues for organizations counting on these methods to filter malicious emails and shield their networks from phishing assaults and malware distribution.

We have now recognized 120 Cisco Safe E mail Gateway/ Cisco Safe E mail and Net Supervisor doubtless susceptible to CVE-2025-20393 (over 650 fingerprinted uncovered). CVE-2025-20393 is exploited within the wild, with no patch accessible. Comply with Cisco suggestions at pic.twitter.com/RKORDZbJT8— The Shadowserver Basis (@Shadowserver) December 20, 2025

CVE-2025-20393 targets Cisco’s e mail safety infrastructure, which enterprises use to examine incoming and outgoing e mail visitors for threats.

Whereas particular technical particulars in regards to the exploitation technique stay restricted to stop widespread abuse, the affirmation of energetic exploitation signifies menace actors are already leveraging this weak spot to compromise susceptible methods.

Cisco has acknowledged the vulnerability and launched a safety advisory urging organizations to implement rapid defensive measures.

The networking large recommends that affected clients assessment their safety configurations and apply non permanent mitigations till a everlasting repair turns into accessible. Organizations can entry detailed steering by Cisco’s Safety Advisory portal.

The state of affairs highlights the continuing challenges organizations face with zero-day vulnerabilities, notably in important infrastructure parts like e mail gateways.

These units sit at a vital junction in enterprise networks, dealing with delicate communications and serving as a main protection in opposition to email-borne threats. A profitable compromise might enable attackers to intercept confidential communications, deploy ransomware, or set up persistent community entry.

Safety groups managing Cisco Safe E mail Gateway and Net Supervisor deployments ought to prioritize reviewing the advisory and implementing advisable countermeasures instantly.

Organizations also needs to monitor their methods for suspicious exercise and take into account briefly limiting exterior entry to those units till patches change into accessible.

The seller has not offered a timeline for when a safety replace will probably be launched, making interim protecting measures important for minimizing publicity to this actively exploited vulnerability.

Comply with us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Cisco, Devices, Email, Exploited, Exposed, Secure, Wild, ZeroDay

Post navigation

Previous Post: Claude Opus 4.5 Now Integrated with GitHub Copilot
Next Post: Iranian Infy APT Resurfaces with New Malware Activity After Years of Silence

Related Posts

Malicious npm Packages as Utilities Let Attackers Destroy Production Systems Malicious npm Packages as Utilities Let Attackers Destroy Production Systems Cyber Security News
CISA Warns of Iranian Cyber Actors May Attack U.S. Critical Infrastructure CISA Warns of Iranian Cyber Actors May Attack U.S. Critical Infrastructure Cyber Security News
Threat Actors Merging FileFix and Cache Smuggling Attacks to Evade Security Controls Threat Actors Merging FileFix and Cache Smuggling Attacks to Evade Security Controls Cyber Security News
Automatic BitLocker Encryption May Silently Lock Away Your Data Automatic BitLocker Encryption May Silently Lock Away Your Data Cyber Security News
Metasploit Module Released For Actively Exploited SharePoint 0-Day Vulnerabilities Metasploit Module Released For Actively Exploited SharePoint 0-Day Vulnerabilities Cyber Security News
Microsoft Asks IT Admins to Contact for Fix Related to Windows IIS Failure Issues Microsoft Asks IT Admins to Contact for Fix Related to Windows IIS Failure Issues Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News