Hundreds of Cisco customers are vulnerable to new Chinese hacking campaign, researchers say

Hundreds of Cisco customers are vulnerable to new Chinese hacking campaign, researchers say

On Wednesday, Cisco reported that a group of hackers believed to be supported by the Chinese government is exploiting a vulnerability to target enterprise customers using some of the company’s widely-used products. Although Cisco has not disclosed how many customers may have been compromised or are operating vulnerable systems, security experts warn that potentially hundreds of Cisco clients could be at risk. Piotr Kijewski, CEO of the nonprofit Shadowserver Foundation, which monitors internet hacking activities, informed TechCrunch that the extent of the exposure appears to be in the hundreds, rather than thousands. Kijewski noted that current attacks seem to be highly targeted, which may explain why widespread activity has not been observed. Shadowserver is actively tracking the number of systems vulnerable to a flaw identified as CVE-2025-20393, classified as a zero-day vulnerability since it was uncovered before Cisco could issue patches. As of the latest updates, countries including India, Thailand, and the United States have reported dozens of affected systems. Censys, another cybersecurity firm, has also identified a limited number of vulnerable Cisco customers, noting 220 internet-exposed Cisco email gateways among the compromised products. Cisco's recent security advisory highlighted that the vulnerability affects software in multiple products, including the Secure Email Gateway and Secure Email and Web Manager. These systems are vulnerable only if they are accessible from the internet and have the “spam quarantine” feature enabled—conditions that are not set by default, which could account for the seemingly low number of vulnerable systems online. Despite the alarming situation, Cisco has not confirmed the figures reported by Shadowserver and Censys. The pressing issue is the lack of available patches. To mitigate the risks, Cisco advises affected customers to wipe and restore compromised appliances to a secure state. The company emphasized that in cases of confirmed breaches, rebuilding the appliances is currently the sole effective method to eliminate the threat actors' mechanisms. According to Cisco’s threat intelligence unit, Talos, this hacking campaign has been active since at least late November 2025, raising concerns about the ongoing nature of the threat.

Sources : TechCrunch

Published On : Dec 19, 2025, 20:25

AI
Atlassian Embraces AI Revolution with Significant Workforce Reductions

In a bold move reflecting the growing influence of artificial intelligence, Atlassian, the Australian productivity softw...

TechCrunch | Mar 12, 2026, 17:45
Atlassian Embraces AI Revolution with Significant Workforce Reductions
Streaming
Substack Unveils Innovative Recording Studio for Creators

Substack is making significant strides in the realm of video content with the introduction of its new Substack Recording...

TechCrunch | Mar 12, 2026, 18:45
Substack Unveils Innovative Recording Studio for Creators
Startups
Meta AI Revolutionizes Buyer-Seller Interactions on Facebook Marketplace

Facebook Marketplace is enhancing its platform with innovative Meta AI functionalities aimed at streamlining communicati...

TechCrunch | Mar 12, 2026, 18:45
Meta AI Revolutionizes Buyer-Seller Interactions on Facebook Marketplace
Computing
Software Industry Faces a Financial Reckoning Amid AI Disruption

A recent conversation with a CEO from a leading software firm revealed alarming predictions for the industry. He warned ...

Business Insider | Mar 12, 2026, 18:20
Software Industry Faces a Financial Reckoning Amid AI Disruption
Startups
Revelations Unveil Live Nation's Ticketing Tactics Amid Legal Scrutiny

Recently released documents have revealed startling admissions from a regional director at Live Nation, who allegedly br...

Ars Technica | Mar 12, 2026, 20:50
Revelations Unveil Live Nation's Ticketing Tactics Amid Legal Scrutiny
View All News