CVE-2025-20393

EUVD-2025-203911
A vulnerability in the Spam Quarantine feature of Cisco AsyncOS Software for Cisco Secure Email Gateway and Cisco Secure Email and Web Manager could allow an unauthenticated, remote attacker to execute arbitrary system commands on an affected device with root privileges.

This vulnerability is due to insufficient validation of HTTP requests by the Spam Quarantine feature. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with root privileges.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
10 CRITICAL
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
ciscoCNA
10 CRITICAL
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 89%
Affected Products (NVD)
VendorProductVersion
ciscoasyncos
𝑥
< 15.0.5-016
ciscoasyncos
15.5 ≤
𝑥
< 15.5.4-012
ciscoasyncos
16.0 ≤
𝑥
< 16.0.4-016
ciscoasyncos
𝑥
< 15.0.2-007
ciscoasyncos
15.5 ≤
𝑥
< 15.5.4-007
ciscoasyncos
16.0 ≤
𝑥
< 16.0.4-010
𝑥
= Vulnerable software versions