{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-20393","assignerOrgId":"d1c1063e-7a18-46af-9102-31f8928bc633","state":"PUBLISHED","assignerShortName":"cisco","dateReserved":"2024-10-10T19:15:13.266Z","datePublished":"2025-12-17T16:47:13.128Z","dateUpdated":"2026-02-26T16:07:31.045Z"},"containers":{"cna":{"title":"Cisco Secure Email Gateway and Cisco Secure Email and Web Manager Remote Command Execution Vulnerability","metrics":[{"format":"cvssV3_1","cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H","baseScore":10,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"}}],"descriptions":[{"lang":"en","value":"A vulnerability in the Spam Quarantine feature of Cisco AsyncOS Software for Cisco Secure Email Gateway and Cisco Secure Email and Web Manager could allow an unauthenticated, remote attacker to execute arbitrary system commands on an affected device with root privileges.\r\n\r\nThis vulnerability is due to insufficient validation of HTTP requests by the Spam Quarantine feature. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with&nbsp;root privileges."}],"references":[{"url":"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sma-attack-N9bf4","name":"cisco-sa-sma-attack-N9bf4"}],"exploits":[{"lang":"en","value":"In December 2025, the Cisco Product Security Incident Response Team (PSIRT) became aware of potentially malicious activity that targets Cisco Secure Email Gateway and Cisco Secure Email and Web Manager appliances."}],"source":{"advisory":"cisco-sa-sma-attack-N9bf4","discovery":"EXTERNAL","defects":["CSCws36549"]},"problemTypes":[{"descriptions":[{"lang":"en","description":"Improper Input Validation","type":"cwe","cweId":"CWE-20"}]}],"affected":[{"vendor":"Cisco","product":"Cisco Secure Email","versions":[{"version":"14.0.0-698","status":"affected"},{"version":"13.5.1-277","status":"affected"},{"version":"13.0.0-392","status":"affected"},{"version":"14.2.0-620","status":"affected"},{"version":"13.0.5-007","status":"affected"},{"version":"13.5.4-038","status":"affected"},{"version":"14.2.1-020","status":"affected"},{"version":"14.3.0-032","status":"affected"},{"version":"15.0.0-104","status":"affected"},{"version":"15.0.1-030","status":"affected"},{"version":"15.5.0-048","status":"affected"},{"version":"15.5.1-055","status":"affected"},{"version":"15.5.2-018","status":"affected"},{"version":"16.0.0-050","status":"affected"},{"version":"15.0.3-002","status":"affected"},{"version":"16.0.0-054","status":"affected"},{"version":"15.5.3-022","status":"affected"},{"version":"16.0.1-017","status":"affected"}],"defaultStatus":"unknown"},{"vendor":"Cisco","product":"Cisco Secure Email and Web Manager","versions":[{"version":"13.6.2-023","status":"affected"},{"version":"13.6.2-078","status":"affected"},{"version":"13.0.0-249","status":"affected"},{"version":"13.0.0-277","status":"affected"},{"version":"13.8.1-052","status":"affected"},{"version":"13.8.1-068","status":"affected"},{"version":"13.8.1-074","status":"affected"},{"version":"14.0.0-404","status":"affected"},{"version":"12.8.1-002","status":"affected"},{"version":"14.1.0-227","status":"affected"},{"version":"13.6.1-201","status":"affected"},{"version":"14.2.0-203","status":"affected"},{"version":"14.2.0-212","status":"affected"},{"version":"12.8.1-021","status":"affected"},{"version":"13.8.1-108","status":"affected"},{"version":"14.2.0-224","status":"affected"},{"version":"14.3.0-120","status":"affected"},{"version":"15.0.0-334","status":"affected"},{"version":"15.5.1-024","status":"affected"},{"version":"15.5.1-029","status":"affected"},{"version":"15.5.2-005","status":"affected"},{"version":"16.0.0-195","status":"affected"},{"version":"15.5.3-017","status":"affected"},{"version":"16.0.1-010","status":"affected"},{"version":"15.0.1-035","status":"affected"},{"version":"16.0.2-088","status":"affected"}],"defaultStatus":"unknown"}],"providerMetadata":{"orgId":"d1c1063e-7a18-46af-9102-31f8928bc633","shortName":"cisco","dateUpdated":"2026-01-15T16:32:03.740Z"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2025-20393","role":"CISA Coordinator","options":[{"Exploitation":"active"},{"Automatable":"yes"},{"Technical Impact":"total"}],"version":"2.0.3","timestamp":"2025-12-18T04:55:22.327258Z"}}},{"other":{"type":"kev","content":{"dateAdded":"2025-12-17","reference":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-20393"}}}],"references":[{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-20393","tags":["government-resource"]}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-02-26T16:07:31.045Z"}}]}}