TROYANOSYVIRUS
Voltar para CVEs

CVE-2025-20393

CRITICALCISA KEV
10.0

Descricao

A vulnerability in the Spam Quarantine feature of Cisco AsyncOS Software for Cisco Secure Email Gateway and Cisco Secure Email and Web Manager could allow an unauthenticated, remote attacker to execute arbitrary system commands on an affected device with root privileges. This vulnerability is due to insufficient validation of HTTP requests by the Spam Quarantine feature. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with root privileges.

Detalhes CVE

Pontuacao CVSS v3.110.0
SeveridadeCRITICAL
Vetor CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Vetor de ataqueNETWORK
ComplexidadeLOW
Privilegios necessariosNONE
Interacao do usuarioNONE
Publicado12/17/2025
Ultima modificacao1/16/2026
Fontekev
Avistamentos honeypot0

CISA KEV

FornecedorCisco
ProdutoMultiple Products
Nome da vulnerabilidadeCisco Multiple Products Improper Input Validation Vulnerability
Data inclusao KEV2025-12-17
Prazo de remediacao2025-12-24
Uso em ransomwareUnknown

Produtos afetados

cisco:asyncoscisco:secure_email_and_web_manager_m170cisco:secure_email_and_web_manager_m190cisco:secure_email_and_web_manager_m195cisco:secure_email_and_web_manager_m380cisco:secure_email_and_web_manager_m390cisco:secure_email_and_web_manager_m390xcisco:secure_email_and_web_manager_m395cisco:secure_email_and_web_manager_m680cisco:secure_email_and_web_manager_m690cisco:secure_email_and_web_manager_m690xcisco:secure_email_and_web_manager_m695cisco:secure_email_and_web_manager_virtual_appliance_m100vcisco:secure_email_and_web_manager_virtual_appliance_m300vcisco:secure_email_and_web_manager_virtual_appliance_m600vcisco:secure_email_gateway_c195cisco:secure_email_gateway_c395cisco:secure_email_gateway_c695cisco:secure_email_gateway_virtual_appliance_c100vcisco:secure_email_gateway_virtual_appliance_c300vcisco:secure_email_gateway_virtual_appliance_c600v

Fraquezas (CWE)

CWE-20

Correlacoes IOC

Sem correlacoes registradas

This product uses data from the NVD API but is not endorsed or certified by the NVD.