Critical CVSS 10.0 RCE in Cisco Secure Email products. Actively exploited vulnerability allows root access via Spam Quarantine. Patch immediately.
| Product | Version Start | Version End (excl.) | Status |
|---|---|---|---|
| asyncos | * | 15.0.5-016 | vulnerable |
| asyncos | 15.5 | 15.5.4-012 | vulnerable |
| asyncos | 16.0 | 16.0.4-016 | vulnerable |
| secure_email_gateway_virtual_appliance_c100v | - | - | unaffected |
| secure_email_gateway_virtual_appliance_c300v | - | - | unaffected |
| secure_email_gateway_virtual_appliance_c600v | - | - | unaffected |
| secure_email_gateway_c195 | - | - | unaffected |
| secure_email_gateway_c395 | - | - | unaffected |
| secure_email_gateway_c695 | - | - | unaffected |
| asyncos | * | 15.0.2-007 | vulnerable |
| asyncos | 15.5 | 15.5.4-007 | vulnerable |
| asyncos | 16.0 | 16.0.4-010 | vulnerable |
| secure_email_and_web_manager_virtual_appliance_m100v | - | - | unaffected |
| secure_email_and_web_manager_virtual_appliance_m300v | - | - | unaffected |
| secure_email_and_web_manager_virtual_appliance_m600v | - | - | unaffected |
| secure_email_and_web_manager_m170 | - | - | unaffected |
| secure_email_and_web_manager_m190 | - | - | unaffected |
| secure_email_and_web_manager_m195 | - | - | unaffected |
| secure_email_and_web_manager_m380 | - | - | unaffected |
| secure_email_and_web_manager_m390 | - | - | unaffected |
| secure_email_and_web_manager_m390x | - | - | unaffected |
| secure_email_and_web_manager_m395 | - | - | unaffected |
| secure_email_and_web_manager_m680 | - | - | unaffected |
| secure_email_and_web_manager_m690 | - | - | unaffected |
| secure_email_and_web_manager_m690x | - | - | unaffected |
| secure_email_and_web_manager_m695 | - | - | unaffected |
Immediately install the security updates provided by Cisco for AsyncOS Software to close the command execution vulnerability in the Spam Quarantine feature.
Upgrade Secure Email Gateway to versions 15.0.5-016, 15.5.4-012, or 16.0.4-016, and Secure Email and Web Manager to 15.0.2-007, 15.5.4-007, or 16.0.4-010.
Limit access to the Spam Quarantine web interface using firewall rules or Access Control Lists (ACLs) to ensure only authorized internal IP addresses can reach the service.
Audit device logs for suspicious HTTP requests directed at the Spam Quarantine component and monitor for unauthorized root-level shell activity or unexpected configuration changes.
Detecting exploitation of CVE-2025-20393 involves monitoring web logs for malformed HTTP requests containing shell metacharacters or command injection payloads targeting the Spam Quarantine URI. Security teams should look for unusual system-level activity, such as the execution of 'whoami' or 'id' commands by the web server process. Additionally, check for unexpected outbound network traffic from the appliance, which could indicate a reverse shell or data staging by an attacker.
Experience superior visibility and a simpler approach to cyber risk management