Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New Tool Released to Detect Cisco Secure Email Gateway 0-Day Vulnerability Exploited in the Wild

New Tool Released to Detect Cisco Secure Email Gateway 0-Day Vulnerability Exploited in the Wild

Posted on December 19, 2025December 19, 2025 By CWS

A light-weight Python script to assist organizations rapidly establish publicity to CVE-2025-20393, a crucial zero-day vulnerability in Cisco Safe Electronic mail Gateway (SEG) and Safe Malware Analytics (SMA), also referred to as Cisco Safe Electronic mail and Net Supervisor.

The instrument “Cisco SMA Publicity Test” detects open ports and providers which have been exploited in current assaults, as detailed in Cisco’s advisory.

Developed by GitHub person StasonJatham and launched publicly at present, the script targets indicators of compromise tied to the flaw, which permits unauthenticated distant attackers to execute arbitrary code by way of uncovered administration and quarantine interfaces.

Attackers have weaponized ports like TCP 82, 83, 443, 8080, 8443, and 9443 for admin entry, alongside quarantine endpoints on 6025, 82, 83, 8443, and 9443.

The instrument scans these, performs HTTP/S fingerprinting (server headers, standing codes, redirects, auth realms, Cisco-specific key phrases, and model patterns), and checks widespread paths corresponding to /quarantine, /spamquarantine, /spam, /sma-login, and /login.

It additionally grabs uncooked socket banners and flags indicators of lively exploitation, together with strings like “AquaShell,” “AquaTunnel,” “Chisel,” and “AquaPurge” – hallmarks of post-compromise instruments noticed within the wild.

Easy Deployment, No Dependencies

Requiring solely Python 3’s commonplace library, the script runs in seconds:

textpython3 cisco-sa-sma-attack-N9bf4.py [-v] [-t ]

-v: Verbose mode reveals all checks.

-t: Customized timeout (default: fast probes).

Helps domains or direct IPs (bypasses DNS).

Port TypeExposed PortsRisk LevelAdmin/Mgmt82, 83, 443, 8080, 8443, 9443CriticalQuarantine/Spam6025, 82, 83, 8443, 9443High

Outcomes flag weak configs, enabling admins to firewall ports, apply Cisco patches, or isolate programs urgently.

Cisco’s advisory warns of lively exploitation, urging instant mitigation. With no CVSS rating revealed but, the vulnerability’s unauthenticated RCE potential echoes previous SMA flaws.

This instrument fills a detection hole, empowering SecOps groups sans industrial scanners. StasonJatham stresses accountable use: “Solely take a look at licensed programs.”

Comply with us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:0Day, Cisco, Detect, Email, Exploited, Gateway, Released, Secure, Tool, Vulnerability, Wild

Post navigation

Previous Post: WatchGuard Warns of Active Exploitation of Critical Fireware OS VPN Vulnerability
Next Post: ‘Kimwolf’ Android Botnet Ensnares 1.8 Million Devices

Related Posts

CrowdStrike Set to Acquire Onum in 0 Million Deal to Enhance Falcon Next-Gen SIEM CrowdStrike Set to Acquire Onum in $290 Million Deal to Enhance Falcon Next-Gen SIEM Cyber Security News
Arsen Launches AI-Powered Vishing Simulation to Help Organizations Combat Voice Phishing at Scale Arsen Launches AI-Powered Vishing Simulation to Help Organizations Combat Voice Phishing at Scale Cyber Security News
Mocha Manakin Using Paste and Run Technique to Trick Users Into Downloading Malicious Payloads Mocha Manakin Using Paste and Run Technique to Trick Users Into Downloading Malicious Payloads Cyber Security News
Decoding PIN-Protected BitLocker Through TPM SPI Analysis To Decrypt And Mount The Disks Decoding PIN-Protected BitLocker Through TPM SPI Analysis To Decrypt And Mount The Disks Cyber Security News
Vidar Malware Uses JPEGs to Hide Payloads Vidar Malware Uses JPEGs to Hide Payloads Cyber Security News
ClickFix Attacks Evolved With Weaponized Videos That Tricks Users via Self-infection Process ClickFix Attacks Evolved With Weaponized Videos That Tricks Users via Self-infection Process Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft
  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft
  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark