A vulnerability in the Spam Quarantine feature of Cisco AsyncOS Software for Cisco Secure Email Gateway and Cisco Secure Email and Web Manager could allow an unauthenticated, remote attacker to execute arbitrary system commands on an affected device with root privileges.
This vulnerability is due to insufficient validation of HTTP requests by the Spam Quarantine feature. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with root privileges.
References
| Link | Resource |
|---|---|
| https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sma-attack-N9bf4 | Vendor Advisory |
| https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-20393 | US Government Resource |
Configurations
Configuration 1 (hide)
| AND |
|
Configuration 2 (hide)
| AND |
|
History
No history.
Information
Published : 2025-12-17 17:15
Updated : 2026-01-16 14:00
NVD link : CVE-2025-20393
Mitre link : CVE-2025-20393
CVE.ORG link : CVE-2025-20393
JSON object : View
Products Affected
cisco
- secure_email_and_web_manager_m690
- secure_email_and_web_manager_m195
- secure_email_and_web_manager_m380
- secure_email_and_web_manager_m170
- secure_email_and_web_manager_m695
- secure_email_and_web_manager_m395
- secure_email_gateway_virtual_appliance_c600v
- secure_email_gateway_c395
- secure_email_and_web_manager_m190
- secure_email_gateway_c195
- secure_email_and_web_manager_virtual_appliance_m600v
- secure_email_gateway_c695
- secure_email_and_web_manager_m390x
- secure_email_and_web_manager_m680
- secure_email_gateway_virtual_appliance_c300v
- secure_email_gateway_virtual_appliance_c100v
- asyncos
- secure_email_and_web_manager_m390
- secure_email_and_web_manager_virtual_appliance_m300v
- secure_email_and_web_manager_virtual_appliance_m100v
- secure_email_and_web_manager_m690x
CWE
CWE-20
Improper Input Validation
