支持本站 — 捐款将帮助我们持续运营

目标:1000 元,已筹:752

75.2%
一、 漏洞 CVE-2025-20393 基础信息
漏洞信息
                                        # 思科安全邮件网关远程命令执行漏洞

## 概述

Cisco发现了一个潜在的安全漏洞,目前正在进行调查。

## 影响版本

暂未公布受影响的具体产品或版本。

## 细节

漏洞的详细信息尚未公开,Cisco正在核实相关情况,并将根据调查进展更新信息。

## 影响

目前未披露漏洞的具体影响,建议用户关注官方后续通告以获取最新状态。
                                        
神龙判断

是否为 Web 类漏洞: 未知

判断理由:

N/A
提示
尽管我们采用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。
神龙会尽力确保数据准确,但也请结合实际情况进行甄别与判断。
神龙祝您一切顺利!
漏洞标题
Cisco Secure Email Gateway and Cisco Secure Email and Web Manager Remote Command Execution Vulnerability
来源:美国国家漏洞数据库 NVD
漏洞描述信息
A vulnerability in the Spam Quarantine feature of Cisco AsyncOS Software for Cisco Secure Email Gateway and Cisco Secure Email and Web Manager could allow an unauthenticated, remote attacker to execute arbitrary system commands on an affected device with root privileges. This vulnerability is due to insufficient validation of HTTP requests by the Spam Quarantine feature. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with root privileges.
来源:美国国家漏洞数据库 NVD
CVSS信息
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
来源:美国国家漏洞数据库 NVD
漏洞类别
输入验证不恰当
来源:美国国家漏洞数据库 NVD
漏洞标题
Cisco Secure Email和Cisco Secure Email and Web Manager 安全漏洞
来源:中国国家信息安全漏洞库 CNNVD
漏洞描述信息
Cisco Secure Email和Cisco Secure Email and Web Manager都是美国思科(Cisco)公司的产品。Cisco Secure Email是思科安全电子邮件(前身为电子邮件安全)为您的电子邮件提供最佳保护,使其免受网络威胁。Cisco Secure Email and Web Manager是一个安全电子邮件和 Web 管理器。 Cisco Secure Email和Cisco Secure Email and Web Manager存在安全漏洞。攻击者利用该漏洞
来源:中国国家信息安全漏洞库 CNNVD
CVSS信息
N/A
来源:中国国家信息安全漏洞库 CNNVD
漏洞类别
其他
来源:中国国家信息安全漏洞库 CNNVD
二、漏洞 CVE-2025-20393 的公开POC
#POC 描述源链接神龙链接
1 This scanner detects Cisco SEG/SEWM appliances vulnerable to CVE-2025-20393, a critical unauthenticated RCE vulnerability in Cisco AsyncOS affecting devices with Spam Quarantine feature exposed to the internet. CVSS Score: 10.0 (Critical) https://github.com/thesystemowner/CVE-2025-20393-POCPOC详情
2Cisco is aware of a potential vulnerability.  Cisco is currently investigating and will update these details as appropriate as more information becomes available.https://github.com/cyberleelawat/CVE-2025-20393POC详情
3Nonehttps://github.com/KingHacker353/CVE-2025-20393POC详情
4Nonehttps://github.com/b1gchoi/CVE-2025-20393POC详情
5Script to detect CVE-2025-20393 for Cisco Secure Email Gateway And Cisco Secure Email and Web Managerhttps://github.com/StasonJatham/cisco-sa-sma-attack-N9bf4POC详情
6CVE-2025-20393https://github.com/Ashwesker/Blackash-CVE-2025-20393POC详情
7CVE-2025-20393https://github.com/Ashwesker/Ashwesker-CVE-2025-20393POC详情
8🔍 Probe hosts for open Cisco Secure Email/Malware Analytics ports and CVE-2025-20393 exposure using a simple Python script.https://github.com/MRH701/mrh701.github.ioPOC详情
9This tool helps identify exposure to CVE-2025-20393 by checking for open TCP/6025 ports, responsive Spam Quarantine interfaces, and known post-exploitation IOCs.https://github.com/cyberdudebivash/CYBERDUDEBIVASH-Cisco-AsyncOS-CVE-2025-20393-ScannerPOC详情
三、漏洞 CVE-2025-20393 的情报信息
四、漏洞 CVE-2025-20393 的评论
匿名用户
2026-01-15 06:08:56

Zaproxy alias impedit expedita quisquam pariatur exercitationem. Nemo rerum eveniet dolores rem quia dignissimos.


发表评论