Home / Technology / Chinese Hackers Exploited Cisco Flaw for Weeks
Chinese Hackers Exploited Cisco Flaw for Weeks
16 Jan
Summary
- Cisco's critical email security flaw was exploited for weeks.
- Chinese state-sponsored groups allegedly used Python backdoor.
- A patch is now available, removing attacker persistence.

A maximum-severity vulnerability in Cisco's Secure Email Gateway (SEG) and Secure Email and Web Manager (SEWM) appliances has been addressed. This critical flaw, tracked as CVE-2025-20393, was allegedly exploited by Chinese state-sponsored threat actors since at least late November 2025, predating Cisco's mid-December 2025 disclosure. The attackers reportedly used a persistent Python-based backdoor known as Aquashell, alongside tunneling tools and a log-clearing utility.
Cisco confirmed that the exploitation allowed threat actors to gain root privileges and maintain control via a persistence mechanism. While Cisco initially offered mitigation advice, a fix was not immediately available. The company has now released software updates designed to resolve the vulnerability. These updates are crucial for removing any installed persistence mechanisms.




