TROYANOSYVIRUS
Zuruck zu CVEs

CVE-2025-20393

CRITICALCISA KEV
10.0

Beschreibung

A vulnerability in the Spam Quarantine feature of Cisco AsyncOS Software for Cisco Secure Email Gateway and Cisco Secure Email and Web Manager could allow an unauthenticated, remote attacker to execute arbitrary system commands on an affected device with root privileges. This vulnerability is due to insufficient validation of HTTP requests by the Spam Quarantine feature. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with root privileges.

CVE Details

CVSS v3.1 Bewertung10.0
SchweregradCRITICAL
CVSS VektorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
AngriffsvektorNETWORK
KomplexitatLOW
Erforderliche PrivilegienNONE
BenutzerinteraktionNONE
Veroffentlicht12/17/2025
Zuletzt geandert1/16/2026
Quellekev
Honeypot-Sichtungen0

CISA KEV

HerstellerCisco
ProduktMultiple Products
SchwachstellennameCisco Multiple Products Improper Input Validation Vulnerability
KEV Aufnahmedatum2025-12-17
Behebungsfrist2025-12-24
Ransomware-NutzungUnknown

Betroffene Produkte

cisco:asyncoscisco:secure_email_and_web_manager_m170cisco:secure_email_and_web_manager_m190cisco:secure_email_and_web_manager_m195cisco:secure_email_and_web_manager_m380cisco:secure_email_and_web_manager_m390cisco:secure_email_and_web_manager_m390xcisco:secure_email_and_web_manager_m395cisco:secure_email_and_web_manager_m680cisco:secure_email_and_web_manager_m690cisco:secure_email_and_web_manager_m690xcisco:secure_email_and_web_manager_m695cisco:secure_email_and_web_manager_virtual_appliance_m100vcisco:secure_email_and_web_manager_virtual_appliance_m300vcisco:secure_email_and_web_manager_virtual_appliance_m600vcisco:secure_email_gateway_c195cisco:secure_email_gateway_c395cisco:secure_email_gateway_c695cisco:secure_email_gateway_virtual_appliance_c100vcisco:secure_email_gateway_virtual_appliance_c300vcisco:secure_email_gateway_virtual_appliance_c600v

Schwachen (CWE)

CWE-20

IOC Korrelationen

Keine Korrelationen erfasst

This product uses data from the NVD API but is not endorsed or certified by the NVD.