Subscribe to Our Newsletter

Success! Now Check Your Email

To complete Subscribe, click the confirmation link in your inbox. If it doesn’t arrive within 3 minutes, check your spam folder.

Ok, Thanks
Cisco Confirms a Zero-Day Security Flaw. Here’s How Users Can Stay Protected
Photo by Towfiqu barbhuiya / Unsplash

Cisco Confirms a Zero-Day Security Flaw. Here’s How Users Can Stay Protected

The attack targets Cisco AsyncOS, the software that powers Cisco Secure Email Gateway, Cisco Secure Email, and Web Manager appliances.

Ogbonda Chivumnovu profile image
by Ogbonda Chivumnovu

Cisco is usually the company organisations turn to when they want fewer surprises in their network. That’s what makes this week’s disclosure uncomfortable. One of the most trusted names in enterprise security is now dealing with a zero-day attack that gives hackers full control over affected systems.

Once compromised, attackers can execute commands with root privileges, effectively owning the underlying operating system and maintaining persistence even after reboots.

Cisco said on Wednesday that the attack is targeting “a limited subset of devices with certain ports open to the internet that are running Cisco AsyncOS Software for Cisco Secure Email Gateway and Cisco Secure Email and Web Manager,” and urged customers to follow guidance in the advisory “to assess any exposure and mitigate risk.” The company added that it is “actively investigating the issue and developing a permanent remediation.”

How to Stay Protected

With no patch yet, Cisco urges locking down exposed systems. “If an appliance has been identified as having the web management interface or the Spam Quarantine port exposed to and reachable from the internet, Cisco strongly recommends following a multi-step process to restore the appliance to a secure configuration,” the advisory states. “If restoring the appliance is not possible, Cisco recommends contacting TAC to check whether the appliance has been compromised.”

Restore appliances to a secure setup or contact Technical Assistance if a compromise is suspected. Confirmed breaches require rebuilding the device.

Limit internet access or restrict it to trusted hosts, place appliances behind firewalls, disable unnecessary services, and separate mail from management functions. Monitor logs, update AsyncOS, use strong authentication, change default admin passwords, and secure access with SSL/TLS. Until a fix arrives, strict configuration and exposure control are your best defence.

Cisco Talos, the company’s threat intelligence unit, linked the campaign to China-aligned threat actors, a familiar pattern for high-value infrastructure targets. This is also not Cisco’s first encounter with state-linked hacking. Earlier in 2024, attackers exploited Cisco Adaptive Security Appliances to breach government networks worldwide, triggering alerts from U.S. authorities.

Other Ways Organisations Can Reduce Risk

Beyond Cisco’s immediate recommendations, security experts generally advise organisations to take a broader view of exposure management, especially for infrastructure products that sit at the edge of corporate networks.

This includes regularly auditing which services are internet-facing, limiting administrative interfaces to internal networks or VPNs, and enforcing strict access controls around critical systems. Organisations should also review logging and alerting practices to ensure suspicious activity is detected quickly, particularly on systems that handle email, authentication, or network traffic.

Regular configuration reviews, network segmentation, and tabletop incident-response exercises can also reduce the impact of zero-day exploits when they occur. While these measures won’t prevent unknown vulnerabilities from emerging, they can significantly limit how far attackers are able to move once a system is compromised.

Conclusion

Taken together, the message is clear. Modern cyberattacks are shifting away from mass exploitation toward fewer, deeper compromises of infrastructure that sits at the heart of enterprise networks. Security vendors are no longer just defenders; they are targets.

For organisations, the lesson isn’t to abandon trusted platforms, but to treat configuration, exposure, and monitoring as first-class security controls. Even the most reputable vendors can be caught off guard. What matters now is how quickly customers can detect, contain, and recover when that happens.

Cisco is placing a $28 billion bet on this cybersecurity firm
Cisco, the world’s largest maker of computer networking equipment, says it has acquired cybersecurity software company Splunk in a blockbuster deal worth $28 billion in cash at $157 per share in cash. Splunk, which produces software for searching, monitoring, and analyzing machine-generated data via a web-style interface, helps businesses monitor

Ogbonda Chivumnovu profile image
by Ogbonda Chivumnovu

Subscribe to Techloy.com

Get the latest information about companies, products, careers, and funding in the technology industry across emerging markets globally.

Success! Now Check Your Email

To complete Subscribe, click the confirmation link in your inbox. If it doesn’t arrive within 3 minutes, check your spam folder.

Ok, Thanks

Read More