Cisco says Chinese hackers are exploiting its customers with a new zero-day

Cisco
Image credit: TechRadar (Image credit: Future)

  • A zero‑day in Cisco AsyncOS lets attackers gain root access on Secure Email appliances with Spam Quarantine exposed online
  • All AsyncOS releases are vulnerable, and with no patch available Cisco urges full wipes and rebuilds to remove persistence
  • Researchers suspect a Chinese state‑sponsored actor, with many large organizations potentially at risk

Cisco is warning that some of its products have a zero-day vulnerability that is now being actively exploited in attacks. There is currently no patch available, and users are advised to take certain steps to harden their defenses instead.

In a security advisory, Cisco said it became aware of a new cyberattack campaign on December 10. This attack targets appliances running Cisco AsyncOS Software for Cisco Secure Email Gateway and Cisco Secure Email and Web Manager.

The bug affects both physical and virtual instances of these appliances, but only when they are configured with the Spam Quarantine feature, which also needs to be exposed to, and reachable from the internet.

Blaming Chinese hackers

No one has claimed responsibility for the incursions just yet, but some researchers believe this is the work of a Chinese state-sponsored threat actor.

The good news is that this feature is not enabled by default. The downside is that all releases of Cisco AsyncOS are affected by this campaign.

The attackers are using this flaw to execute arbitrary commands with root privileges on the operating system, essentially taking over the compromised devices.

Cisco did not say how many companies were targeted, or how many fell victim, but since there is no patch for the bug right now, Cisco advises users to take certain measures, including “restoring the appliance to a secure configuration”. In other words - wiping and rebuilding the software from the ground up.

Those that are unable to wipe the appliances should contact TAC to check if their products were compromised and if they get a confirmation, “rebuilding the appliances is currently the only viable option to eradicate the threat actors’ persistence mechanism from the appliance.”


Best antivirus software header
The best antivirus for all budgets

Follow TechRadar on Google News and add us as a preferred source to get our expert news, reviews, and opinion in your feeds. Make sure to click the Follow button!

And of course you can also follow TechRadar on TikTok for news, reviews, unboxings in video form, and get regular updates from us on WhatsApp too.

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

You must confirm your public display name before commenting

Please logout and then login again, you will then be prompted to enter your display name.