By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Gulf PressGulf Press
  • Home
  • Gulf News
  • World
  • Business
  • Technology
  • Sports
  • Lifestyle
Search
Countries
More Topics
  • Health
  • Entertainment
Site Links
  • Customize Interests
  • Bookmarks
  • Newsletter
  • Terms
  • Press Release
  • Advertise
  • Contact
© 2023 Gulf Press. All Rights Reserved.
Reading: Hundreds of Cisco customers are vulnerable to new Chinese hacking campaign, researchers say
Share
Notification Show More
Latest News
Harrowing stories of torturing detainees and secrets of death chambers run by STC-affiliated groups come from Yemen
Gulf
President of Azerbaijan meets Prime Minister and Minister of Foreign Affairs
Gulf
Committee Reviews Plans for “Year of Isa Al Kabeer” Observances
Gulf
Al-Awadhi inaugurates additional surgical wing at Amiri Hospital
Gulf
UAE to launch new AI-powered trade platform
Business
Aa
Gulf PressGulf Press
Aa
  • Gulf News
  • World
  • Business
  • Entertainment
  • Lifestyle
  • Sports
Search
  • Home
  • Gulf
  • Business
  • More News
    • World
    • Technology
    • Lifestyle
    • Entertainment
    • Sports
Have an existing account? Sign In
Follow US
  • Terms
  • Press Release
  • Advertise
  • Contact
© 2023 Gulf Press. All Rights Reserved.
Gulf Press > Technology > Hundreds of Cisco customers are vulnerable to new Chinese hacking campaign, researchers say
Technology

Hundreds of Cisco customers are vulnerable to new Chinese hacking campaign, researchers say

News Room
Last updated: 2025/12/24 at 4:54 PM
News Room
Share
6 Min Read
SHARE

Cisco security products are facing a significant threat as a Chinese government-backed hacking group exploits a zero-day vulnerability, potentially impacting hundreds of enterprise customers. The vulnerability, officially designated CVE-2025-20393, affects Cisco’s Secure Email Gateway and Secure Email and Web Manager, raising concerns about data breaches and system compromise. This ongoing campaign, first detected in late November 2025, highlights the increasing sophistication and persistence of state-sponsored cyberattacks.

Cisco Hack: Understanding the Scope of the Vulnerability

On Wednesday, Cisco publicly disclosed the active exploitation of the zero-day vulnerability by a threat actor believed to be affiliated with the Chinese government. A zero-day vulnerability means the flaw was unknown to the vendor – in this case, Cisco – before it was actively exploited, leaving systems exposed without available patches. The affected products are commonly used by organizations to filter email and web traffic, making them attractive targets for attackers seeking access to sensitive information.

Currently, the number of compromised systems appears limited. Shadowserver Foundation, a non-profit organization tracking internet hacking campaigns, estimates that the exposure is in the hundreds, not thousands. This suggests a highly targeted approach rather than a widespread, indiscriminate attack. However, the potential impact on those targeted remains substantial.

Affected Systems and Exposure

Censys, a cybersecurity firm specializing in internet-wide scanning, has identified approximately 220 internet-exposed Cisco email gateways vulnerable to the flaw. According to Cisco, systems are only at risk if they are directly accessible from the internet and have the “spam quarantine” feature enabled. This feature is not activated by default, which may explain the relatively low number of exposed systems observed so far.

Geographically, initial reports indicate affected systems in India, Thailand, and the United States. Security researchers continue to monitor for further spread and identify additional impacted regions. The limited geographic scope at this stage doesn’t diminish the severity of the threat, as targeted attacks can be highly effective.

Why This Hack is Different: No Patch Available

The most concerning aspect of this Cisco hack is the absence of a readily available patch. Unlike typical vulnerability disclosures where a fix is released shortly after, Cisco currently recommends a complete rebuild of affected appliances to eliminate the threat actor’s presence. This is a significantly more disruptive and time-consuming remediation process for organizations.

According to Cisco’s advisory, rebuilding the appliance is “currently, the only viable option” to eradicate the attacker’s persistence mechanisms. This indicates the hackers have established a foothold within the systems and are employing techniques that are not easily removed with a simple software update. The complexity of the remediation process underscores the sophistication of the attackers.

Cisco’s threat intelligence arm, Talos, has been tracking the campaign since at least late November 2025. The extended timeframe of the attack suggests the hackers are actively refining their methods and seeking to maximize their access. This prolonged activity also increases the likelihood of further compromise and data exfiltration.

Implications for Cybersecurity and Network Security

This incident serves as a stark reminder of the persistent threat posed by state-sponsored actors. These groups often have significant resources and advanced capabilities, allowing them to discover and exploit vulnerabilities before they are publicly known. The focus on enterprise targets also highlights the value of corporate data and the potential for espionage or financial gain.

The lack of a patch forces organizations to rely on more drastic measures, potentially disrupting critical email and web security services. This situation emphasizes the importance of proactive security measures, such as robust network segmentation and regular vulnerability assessments. Organizations should also review their security configurations to ensure unnecessary features, like the spam quarantine in this case, are disabled.

Furthermore, this cybersecurity breach underscores the need for improved information sharing between technology vendors and government agencies. Faster detection and coordinated response efforts are crucial to mitigating the impact of these types of attacks. The incident also raises questions about supply chain network security and the potential for vulnerabilities to be introduced through third-party software.

Cisco has not publicly commented on the specific numbers reported by Shadowserver and Censys, leaving some uncertainty about the full extent of the compromise.

Looking ahead, organizations using Cisco’s affected products should prioritize identifying and rebuilding any potentially compromised appliances. The development and release of a patch remain the ultimate solution, and Cisco is likely working diligently to address the vulnerability. The cybersecurity community will continue to monitor the situation for further developments and assess the long-term impact of this ongoing campaign.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
I have read and agree to the terms & conditions
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
News Room December 24, 2025
Share this Article
Facebook Twitter Copy Link Print
Previous Article Europe defends its digital rules after US targets Breton with visa ban
Next Article Why a red-nosed Emirates A380 at DXB is stealing everyone’s attention this Christmas
Leave a comment Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

235.3k Followers Like
69.1k Followers Follow
56.4k Followers Follow
136k Subscribers Subscribe
- Advertisement -
Ad imageAd image

Latest News

Harrowing stories of torturing detainees and secrets of death chambers run by STC-affiliated groups come from Yemen
Gulf January 21, 2026
President of Azerbaijan meets Prime Minister and Minister of Foreign Affairs
Gulf January 21, 2026
Committee Reviews Plans for “Year of Isa Al Kabeer” Observances
Gulf January 21, 2026
Al-Awadhi inaugurates additional surgical wing at Amiri Hospital
Gulf January 21, 2026

You Might also Like

Technology

Snowflake, Databricks challenger ClickHouse hits $15B valuation

January 21, 2026
Technology

California AG sends Musk’s xAI a cease-and-desist order over sexual deepfakes

January 20, 2026
Technology

AI cloud startup Runpod hits $120M in ARR — and it started with a Reddit post  

January 20, 2026
Technology

Digital analytics platform Dataroid raises $6.6M to boost global expansion

January 20, 2026
Technology

Oshen built the first ocean robot to collect data in a Category 5 hurricane 

January 20, 2026
Technology

Trump administration’s legal setbacks are good news for offshore wind — and the grid

January 20, 2026
Technology

Who gets to inherit the stars? A space ethicist on what we’re not talking about

January 20, 2026
Technology

Why Silicon Valley is really talking about fleeing California (it’s not the 5%)

January 20, 2026
//

Gulf Press is your one-stop website for the latest news and updates about Arabian Gulf and the world, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of ue
  • Advertise
  • Contact

How Topics

  • Gulf News
  • International
  • Business
  • Lifestyle

Sign Up for Our Newsletter

Subscribe to our newsletter to get our latest news instantly!

I have read and agree to the terms & conditions
Gulf PressGulf Press
Follow US

© 2023 Gulf Press. All Rights Reserved.

Join Us!

Subscribe to our newsletter and never miss our latest news, podcasts etc..

I have read and agree to the terms & conditions
Zero spam, Unsubscribe at any time.

Removed from reading list

Undo
Welcome Back!

Sign in to your account

Lost your password?