Get all your news in one place.
100’s of premium titles.
One app.
Start reading
TechRadar
TechRadar
Sead Fadilpašić

Cisco says Chinese hackers are exploiting its customers with a new zero-day

Cisco.
  • A zero‑day in Cisco AsyncOS lets attackers gain root access on Secure Email appliances with Spam Quarantine exposed online
  • All AsyncOS releases are vulnerable, and with no patch available Cisco urges full wipes and rebuilds to remove persistence
  • Researchers suspect a Chinese state‑sponsored actor, with many large organizations potentially at risk

Cisco is warning that some of its products have a zero-day vulnerability that is now being actively exploited in attacks. There is currently no patch available, and users are advised to take certain steps to harden their defenses instead.

In a security advisory, Cisco said it became aware of a new cyberattack campaign on December 10. This attack targets appliances running Cisco AsyncOS Software for Cisco Secure Email Gateway and Cisco Secure Email and Web Manager.

The bug affects both physical and virtual instances of these appliances, but only when they are configured with the Spam Quarantine feature, which also needs to be exposed to, and reachable from the internet.

Blaming Chinese hackers

No one has claimed responsibility for the incursions just yet, but some researchers believe this is the work of a Chinese state-sponsored threat actor.

The good news is that this feature is not enabled by default. The downside is that all releases of Cisco AsyncOS are affected by this campaign.

The attackers are using this flaw to execute arbitrary commands with root privileges on the operating system, essentially taking over the compromised devices.

Cisco did not say how many companies were targeted, or how many fell victim, but since there is no patch for the bug right now, Cisco advises users to take certain measures, including “restoring the appliance to a secure configuration”. In other words - wiping and rebuilding the software from the ground up.

Those that are unable to wipe the appliances should contact TAC to check if their products were compromised and if they get a confirmation, “rebuilding the appliances is currently the only viable option to eradicate the threat actors’ persistence mechanism from the appliance.”

Follow TechRadar on Google News and add us as a preferred source to get our expert news, reviews, and opinion in your feeds. Make sure to click the Follow button!

And of course you can also follow TechRadar on TikTok for news, reviews, unboxings in video form, and get regular updates from us on WhatsApp too.

Sign up to read this article
Read news from 100’s of titles, curated specifically for you.
Already a member? Sign in here
Related Stories
Top stories on inkl right now
One subscription that gives you access to news from hundreds of sites
Already a member? Sign in here
Our Picks
Fourteen days free
Download the app
One app. One membership.
100+ trusted global sources.