Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New Tool Released to Detect Cisco Secure Email Gateway 0-Day Vulnerability Exploited in the Wild

New Tool Released to Detect Cisco Secure Email Gateway 0-Day Vulnerability Exploited in the Wild

Posted on December 19, 2025December 19, 2025 By CWS

A light-weight Python script to assist organizations rapidly establish publicity to CVE-2025-20393, a crucial zero-day vulnerability in Cisco Safe Electronic mail Gateway (SEG) and Safe Malware Analytics (SMA), also referred to as Cisco Safe Electronic mail and Net Supervisor.

The instrument “Cisco SMA Publicity Test” detects open ports and providers which have been exploited in current assaults, as detailed in Cisco’s advisory.

Developed by GitHub person StasonJatham and launched publicly at present, the script targets indicators of compromise tied to the flaw, which permits unauthenticated distant attackers to execute arbitrary code by way of uncovered administration and quarantine interfaces.

Attackers have weaponized ports like TCP 82, 83, 443, 8080, 8443, and 9443 for admin entry, alongside quarantine endpoints on 6025, 82, 83, 8443, and 9443.

The instrument scans these, performs HTTP/S fingerprinting (server headers, standing codes, redirects, auth realms, Cisco-specific key phrases, and model patterns), and checks widespread paths corresponding to /quarantine, /spamquarantine, /spam, /sma-login, and /login.

It additionally grabs uncooked socket banners and flags indicators of lively exploitation, together with strings like “AquaShell,” “AquaTunnel,” “Chisel,” and “AquaPurge” – hallmarks of post-compromise instruments noticed within the wild.

Easy Deployment, No Dependencies

Requiring solely Python 3’s commonplace library, the script runs in seconds:

textpython3 cisco-sa-sma-attack-N9bf4.py [-v] [-t ]

-v: Verbose mode reveals all checks.

-t: Customized timeout (default: fast probes).

Helps domains or direct IPs (bypasses DNS).

Port TypeExposed PortsRisk LevelAdmin/Mgmt82, 83, 443, 8080, 8443, 9443CriticalQuarantine/Spam6025, 82, 83, 8443, 9443High

Outcomes flag weak configs, enabling admins to firewall ports, apply Cisco patches, or isolate programs urgently.

Cisco’s advisory warns of lively exploitation, urging instant mitigation. With no CVSS rating revealed but, the vulnerability’s unauthenticated RCE potential echoes previous SMA flaws.

This instrument fills a detection hole, empowering SecOps groups sans industrial scanners. StasonJatham stresses accountable use: “Solely take a look at licensed programs.”

Comply with us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:0Day, Cisco, Detect, Email, Exploited, Gateway, Released, Secure, Tool, Vulnerability, Wild

Post navigation

Previous Post: WatchGuard Warns of Active Exploitation of Critical Fireware OS VPN Vulnerability
Next Post: ‘Kimwolf’ Android Botnet Ensnares 1.8 Million Devices

Related Posts

GenAI Makes it Easier for Cybercriminals to Successfully Lure Victims into Scams GenAI Makes it Easier for Cybercriminals to Successfully Lure Victims into Scams Cyber Security News
4M+ Internet-Exposed Systems at Risk From Tunneling Protocol Vulnerabilities 4M+ Internet-Exposed Systems at Risk From Tunneling Protocol Vulnerabilities Cyber Security News
Hackers Leverage Browser-in-the-browser Tactic to Trick Facebook Users and Steal Logins Hackers Leverage Browser-in-the-browser Tactic to Trick Facebook Users and Steal Logins Cyber Security News
Underground Ransomware Gang With New Tactics Against Organizations Worldwide Underground Ransomware Gang With New Tactics Against Organizations Worldwide Cyber Security News
CISA Adds Fortinet Vulnerability to KEV Catalog After Active Exploitation CISA Adds Fortinet Vulnerability to KEV Catalog After Active Exploitation Cyber Security News
Muddled Libra Actors Attacking Organizations Call Centers for Initial Infiltration Muddled Libra Actors Attacking Organizations Call Centers for Initial Infiltration Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Researchers Find 341 Malicious ClawHub Skills Stealing Data from OpenClaw Users
  • DynoWiper Data-Wiping Malware Attacking Energy Companies to Destroy Data
  • 30 Wind and Solar Farms in Poland Faced Coordinated Cyberattacks
  • OpenClaw Bug Enables One-Click Remote Code Execution via Malicious Link
  • Microsoft Begins NTLM Phase-Out With Three-Stage Plan to Move Windows to Kerberos

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Researchers Find 341 Malicious ClawHub Skills Stealing Data from OpenClaw Users
  • DynoWiper Data-Wiping Malware Attacking Energy Companies to Destroy Data
  • 30 Wind and Solar Farms in Poland Faced Coordinated Cyberattacks
  • OpenClaw Bug Enables One-Click Remote Code Execution via Malicious Link
  • Microsoft Begins NTLM Phase-Out With Three-Stage Plan to Move Windows to Kerberos

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark