Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
100+ Cisco Secure Email Devices Exposed to Zero‑Day Exploited in the Wild

100+ Cisco Secure Email Devices Exposed to Zero‑Day Exploited in the Wild

Posted on December 21, 2025December 21, 2025 By CWS

Safety researchers have recognized at the least 120 Cisco Safe E mail Gateway and Cisco Safe E mail and Net Supervisor units susceptible to a important zero-day flaw that attackers are actively exploiting within the wild.

The vulnerability, tracked as CVE-2025-20393, presently has no accessible patch, leaving organizations uncovered to potential compromise.

Based on menace intelligence from Shadowserver Basis, the susceptible units signify a subset of greater than 650 fingerprinted uncovered Cisco e mail safety home equipment accessible over the web.

The invention raises vital issues for organizations counting on these methods to filter malicious emails and shield their networks from phishing assaults and malware distribution.

We have now recognized 120 Cisco Safe E mail Gateway/ Cisco Safe E mail and Net Supervisor doubtless susceptible to CVE-2025-20393 (over 650 fingerprinted uncovered). CVE-2025-20393 is exploited within the wild, with no patch accessible. Comply with Cisco suggestions at pic.twitter.com/RKORDZbJT8— The Shadowserver Basis (@Shadowserver) December 20, 2025

CVE-2025-20393 targets Cisco’s e mail safety infrastructure, which enterprises use to examine incoming and outgoing e mail visitors for threats.

Whereas particular technical particulars in regards to the exploitation technique stay restricted to stop widespread abuse, the affirmation of energetic exploitation signifies menace actors are already leveraging this weak spot to compromise susceptible methods.

Cisco has acknowledged the vulnerability and launched a safety advisory urging organizations to implement rapid defensive measures.

The networking large recommends that affected clients assessment their safety configurations and apply non permanent mitigations till a everlasting repair turns into accessible. Organizations can entry detailed steering by Cisco’s Safety Advisory portal.

The state of affairs highlights the continuing challenges organizations face with zero-day vulnerabilities, notably in important infrastructure parts like e mail gateways.

These units sit at a vital junction in enterprise networks, dealing with delicate communications and serving as a main protection in opposition to email-borne threats. A profitable compromise might enable attackers to intercept confidential communications, deploy ransomware, or set up persistent community entry.

Safety groups managing Cisco Safe E mail Gateway and Net Supervisor deployments ought to prioritize reviewing the advisory and implementing advisable countermeasures instantly.

Organizations also needs to monitor their methods for suspicious exercise and take into account briefly limiting exterior entry to those units till patches change into accessible.

The seller has not offered a timeline for when a safety replace will probably be launched, making interim protecting measures important for minimizing publicity to this actively exploited vulnerability.

Comply with us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Cisco, Devices, Email, Exploited, Exposed, Secure, Wild, ZeroDay

Post navigation

Previous Post: Claude Opus 4.5 Now Integrated with GitHub Copilot
Next Post: Iranian Infy APT Resurfaces with New Malware Activity After Years of Silence

Related Posts

Sturnus Banking Malware Steals Communications from Signal and WhatsApp, Gaining Full Control of The Device Sturnus Banking Malware Steals Communications from Signal and WhatsApp, Gaining Full Control of The Device Cyber Security News
Threat Actors Weaponizes AI Generated Summaries With Malicious Payload to Execute Ransomware Threat Actors Weaponizes AI Generated Summaries With Malicious Payload to Execute Ransomware Cyber Security News
How SOC Teams Detect Can Detect Cyber Threats Quickly Using Threat Intelligence Feeds How SOC Teams Detect Can Detect Cyber Threats Quickly Using Threat Intelligence Feeds Cyber Security News
Atomic macOS Stealer Comes With New Backdoor to Enable Remote Access Atomic macOS Stealer Comes With New Backdoor to Enable Remote Access Cyber Security News
First AI Ransomware ‘PromptLock’ Uses OpenAI gpt-oss-20b Model for Encryption First AI Ransomware ‘PromptLock’ Uses OpenAI gpt-oss-20b Model for Encryption Cyber Security News
4M+ Internet-Exposed Systems at Risk From Tunneling Protocol Vulnerabilities 4M+ Internet-Exposed Systems at Risk From Tunneling Protocol Vulnerabilities Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • The Crucial Role of Initial Decisions in Incident Response
  • Citrix NetScaler Targeted by Sophisticated Scanning Campaign
  • Varonis Acquires AllTrue.ai to Enhance AI Security
  • Orchid Security Enhances Enterprise Identity Observability
  • Active Directory Breach: Hackers Target NTDS.dit File

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • The Crucial Role of Initial Decisions in Incident Response
  • Citrix NetScaler Targeted by Sophisticated Scanning Campaign
  • Varonis Acquires AllTrue.ai to Enhance AI Security
  • Orchid Security Enhances Enterprise Identity Observability
  • Active Directory Breach: Hackers Target NTDS.dit File

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark