CVE-2025-20393

Source
https://cve.org/CVERecord?id=CVE-2025-20393
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-20393.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-20393
Published
2025-12-17T17:15:48.523Z
Modified
2026-03-12T17:38:57.153635Z
Severity
  • 10.0 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

A vulnerability in the Spam Quarantine feature of Cisco AsyncOS Software for Cisco Secure Email Gateway and Cisco Secure Email and Web Manager could allow an unauthenticated, remote attacker to execute arbitrary system commands on an affected device with root privileges.

This vulnerability is due to insufficient validation of HTTP requests by the Spam Quarantine feature. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with root privileges.

References

Affected packages

Git /

Affected ranges

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-20393.json"
unresolved_ranges
[
    {
        "events": [
            {
                "introduced": "0"
            },
            {
                "fixed": "15.0.5-016"
            }
        ]
    },
    {
        "events": [
            {
                "introduced": "15.5"
            },
            {
                "fixed": "15.5.4-012"
            }
        ]
    },
    {
        "events": [
            {
                "introduced": "16.0"
            },
            {
                "fixed": "16.0.4-016"
            }
        ]
    },
    {
        "events": [
            {
                "introduced": "0"
            },
            {
                "fixed": "15.0.2-007"
            }
        ]
    },
    {
        "events": [
            {
                "introduced": "15.5"
            },
            {
                "fixed": "15.5.4-007"
            }
        ]
    },
    {
        "events": [
            {
                "introduced": "16.0"
            },
            {
                "fixed": "16.0.4-010"
            }
        ]
    }
]