|
What is the Attack? |
Cisco has confirmed the active exploitation of a critical zero-day vulnerability in AsyncOS, tracked as CVE-2025-20393, affecting Cisco Secure Email Gateway (SEG) and Secure Email and Web Manager (SEWM) appliances. The vulnerability allows unauthenticated remote attackers to execute arbitrary operating system commands with root-level privileges, leading to full device compromise. At the time of vendor disclosure on December 17, 2025, Cisco reported that no security patch was available, increasing the risk of widespread exploitation in affected environments. |
|
What is the recommended Mitigation? |
Cisco has urged organizations to immediately restrict internet exposure of AsyncOS management and quarantine interfaces, closely monitor for indicators of compromise, and review logs for signs of unauthorized access or tampering. Organizations suspecting compromise are advised to treat affected appliances as fully breached and perform forensic analysis or rebuild systems as necessary. Continued monitoring is critical until official patches or permanent mitigations are released. |
|
What FortiGuard Coverage is available? |
|