Cisco Patches Critical Zero-Day RCE Exploited by China-Linked APT: CVE-2025-20393 Explained (2026)

A critical security flaw has been discovered and patched by Cisco, and it's a big one! This vulnerability, with a perfect CVSS score of 10.0, was exploited as a zero-day by a China-linked advanced persistent threat (APT) group, known as UAT-9686. The flaw, tracked as CVE-2025-20393, is a remote command execution issue that arises due to the Spam Quarantine feature's inadequate validation of HTTP requests. If successfully exploited, an attacker could gain root-level access and execute arbitrary commands on the affected appliance's underlying operating system.

But here's where it gets tricky: for this attack to be successful, three specific conditions must align. First, the appliance must be running a vulnerable version of Cisco AsyncOS Software. Second, the Spam Quarantine feature needs to be enabled. And third, this feature must be accessible and reachable from the internet.

Last month, Cisco revealed that UAT-9686 had been exploiting this vulnerability since November 2025. The attackers used it to deploy tunneling tools like ReverseSSH and Chisel, along with a log cleaning utility named AquaPurge. They also deployed a lightweight Python backdoor, AquaShell, capable of receiving and executing encoded commands.

Cisco has now released security updates to address this vulnerability across various AsyncOS Software releases. The company has also taken steps to remove the persistence mechanisms installed by this attack campaign on affected appliances.

In addition to the patches, Cisco recommends several hardening measures to enhance security. These include preventing access from unsecured networks, securing appliances behind firewalls, monitoring web log traffic for any unusual activity, disabling unnecessary network services, enforcing strong end-user authentication (e.g., SAML or LDAP), and changing default administrator passwords to more secure ones.

This is a significant development in the world of cybersecurity, and it's a reminder of the constant cat-and-mouse game between attackers and defenders. It's crucial for organizations to stay vigilant, apply patches promptly, and follow best practices to mitigate such threats.

What are your thoughts on this critical vulnerability and Cisco's response? Do you think the measures taken are sufficient to protect against such advanced threats? Let's discuss in the comments and share our insights on this ongoing battle in the digital realm.

Cisco Patches Critical Zero-Day RCE Exploited by China-Linked APT: CVE-2025-20393 Explained (2026)
Top Articles
Latest Posts
Recommended Articles
Article information

Author: Msgr. Benton Quitzon

Last Updated:

Views: 6107

Rating: 4.2 / 5 (63 voted)

Reviews: 94% of readers found this page helpful

Author information

Name: Msgr. Benton Quitzon

Birthday: 2001-08-13

Address: 96487 Kris Cliff, Teresiafurt, WI 95201

Phone: +9418513585781

Job: Senior Designer

Hobby: Calligraphy, Rowing, Vacation, Geocaching, Web surfing, Electronics, Electronics

Introduction: My name is Msgr. Benton Quitzon, I am a comfortable, charming, thankful, happy, adventurous, handsome, precious person who loves writing and wants to share my knowledge and understanding with you.