Published on: 18 December 2025
Cisco released a security advisory to address the vulnerability in Cisco device and software. For information about the vulnerability and the attacking vectors, please refer to the corresponding security advisory at the vendor's website.
Reports indicated that the critical remote code execution vulnerability (CVE-2025-20393) in Cisco AsyncOS Software for Cisco Secure Email Gateway and Cisco Secure Email and Web Manager is being exploited in the wild. Cisco has released security updates to address the issues. System administrators are advised to take immediate action to patch your affected systems to mitigate the elevated risk of cyber attacks.
The vulnerability affects Cisco AsyncOS Software running on the following appliances (both physical and virtual editions):
Systems are vulnerable only in non-standard configurations where the Spam Quarantine feature is configured, and the Spam Quarantine interface (or associated ports) is exposed to and reachable from the internet. For detailed information of the affected products, please refer to the section 'Affected Products' of corresponding security advisory at vendor's website.
Depending on the vulnerability being exploited, a successful exploitation could lead to remote code execution on an affected system.
Software updates for affected systems are now available. System administrators of affected systems should follow the recommendations provided by the product vendor and take immediate actions to mitigate the risk. For detailed information of the available patches, please refer to the section "Fixed Software" of corresponding security advisory at vendor's website.
System administrators should contact their product support vendors for the fixes and assistance.