Categories: Cyber Security News

New Tool Released to Detect Cisco Secure Email Gateway 0-Day Vulnerability Exploited in the Wild

A lightweight Python script to help organizations quickly identify exposure to CVE-2025-20393, a critical zero-day vulnerability in Cisco Secure Email Gateway (SEG) and Secure Malware Analytics (SMA), also known as Cisco Secure Email and Web Manager.

The tool “Cisco SMA Exposure Check” detects open ports and services that have been exploited in recent attacks, as detailed in Cisco’s advisory.

Developed by GitHub user StasonJatham and released publicly today, the script targets indicators of compromise tied to the flaw, which allows unauthenticated remote attackers to execute arbitrary code via exposed management and quarantine interfaces.

Attackers have weaponized ports like TCP 82, 83, 443, 8080, 8443, and 9443 for admin access, alongside quarantine endpoints on 6025, 82, 83, 8443, and 9443.

The tool scans these, performs HTTP/S fingerprinting (server headers, status codes, redirects, auth realms, Cisco-specific keywords, and version patterns), and checks common paths such as /quarantine, /spamquarantine, /spam, /sma-login, and /login.

It also grabs raw socket banners and flags indicators of active exploitation, including strings like “AquaShell,” “AquaTunnel,” “Chisel,” and “AquaPurge” – hallmarks of post-compromise tools observed in the wild.

Simple Deployment, No Dependencies

Requiring only Python 3’s standard library, the script runs in seconds:

textpython3 cisco-sa-sma-attack-N9bf4.py [-v] [-t <timeout-seconds>] <host-or-domain>
  • -v: Verbose mode shows all checks.
  • -t: Custom timeout (default: quick probes).
  • Supports domains or direct IPs (bypasses DNS).
Port Type Exposed Ports Risk Level
Admin/Mgmt 82, 83, 443, 8080, 8443, 9443 Critical
Quarantine/Spam 6025, 82, 83, 8443, 9443 High

Results flag vulnerable configs, enabling admins to firewall ports, apply Cisco patches, or isolate systems urgently.

Cisco’s advisory warns of active exploitation, urging immediate mitigation. With no CVSS score published yet, the vulnerability’s unauthenticated RCE potential echoes past SMA flaws.

This tool fills a detection gap, empowering SecOps teams sans commercial scanners. StasonJatham stresses responsible use: “Only test authorized systems.”

Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

The post New Tool Released to Detect Cisco Secure Email Gateway 0-Day Vulnerability Exploited in the Wild appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

National Record Store Day draws crowds to Rockford’s Culture Shock

Culture Shock in Rockford hosted its 19th annual Record Store Day event Saturday, featuring new…

3 hours ago

Invincible Season 4 Animation Error Sparks Debate Amongst Fans

Warning! Spoilers for Invincible on Prime Video follow.Fans of Prime Video’s Invincible have started debating…

3 hours ago

Lena community unites for recovery after severe weather damage

The community of Lena has launched a widespread recovery and debris cleanup effort following significant…

4 hours ago

Lena Brewing Company serves customers and collects donations despite damage

Lena Brewing Company in Lena, located on Highway 20, is currently operating on a generator…

4 hours ago

Kevin Feige on Casting Robert Downey Jr. as Doctor Doom: ‘It’s Our Universe’

Marvel Studios mastermind Kevin Feige has opened up about the decision to bring Robert Downey…

5 hours ago

Project Hail Mary Author Andy Weir Reveals the One Scene From the Book He Wishes Had Made It Into the Movie

Project Hail Mary author Andy Weir has revealed his “only regret” about the movie, confirming…

5 hours ago

This website uses cookies.