# 思科安全邮件网关远程命令执行漏洞
## 概述
Cisco发现了一个潜在的安全漏洞,目前正在进行调查。
## 影响版本
暂未公布受影响的具体产品或版本。
## 细节
漏洞的详细信息尚未公开,Cisco正在核实相关情况,并将根据调查进展更新信息。
## 影响
目前未披露漏洞的具体影响,建议用户关注官方后续通告以获取最新状态。
是否为 Web 类漏洞: 未知
判断理由:
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | This scanner detects Cisco SEG/SEWM appliances vulnerable to CVE-2025-20393, a critical unauthenticated RCE vulnerability in Cisco AsyncOS affecting devices with Spam Quarantine feature exposed to the internet. CVSS Score: 10.0 (Critical) | https://github.com/thesystemowner/CVE-2025-20393-POC | POC详情 |
| 2 | Cisco is aware of a potential vulnerability. Cisco is currently investigating and will update these details as appropriate as more information becomes available. | https://github.com/cyberleelawat/CVE-2025-20393 | POC详情 |
| 3 | None | https://github.com/KingHacker353/CVE-2025-20393 | POC详情 |
| 4 | None | https://github.com/b1gchoi/CVE-2025-20393 | POC详情 |
| 5 | Script to detect CVE-2025-20393 for Cisco Secure Email Gateway And Cisco Secure Email and Web Manager | https://github.com/StasonJatham/cisco-sa-sma-attack-N9bf4 | POC详情 |
| 6 | CVE-2025-20393 | https://github.com/Ashwesker/Blackash-CVE-2025-20393 | POC详情 |
| 7 | CVE-2025-20393 | https://github.com/Ashwesker/Ashwesker-CVE-2025-20393 | POC详情 |
| 8 | 🔍 Probe hosts for open Cisco Secure Email/Malware Analytics ports and CVE-2025-20393 exposure using a simple Python script. | https://github.com/MRH701/mrh701.github.io | POC详情 |
| 9 | This tool helps identify exposure to CVE-2025-20393 by checking for open TCP/6025 ports, responsive Spam Quarantine interfaces, and known post-exploitation IOCs. | https://github.com/cyberdudebivash/CYBERDUDEBIVASH-Cisco-AsyncOS-CVE-2025-20393-Scanner | POC详情 |
Zaproxy alias impedit expedita quisquam pariatur exercitationem. Nemo rerum eveniet dolores rem quia dignissimos.