Article Details

Scrape Timestamp (UTC): 2025-11-12 14:04:36.155

Source: https://thehackernews.com/2025/11/amazon-uncovers-attacks-exploited-cisco.html

Original Article Text

Click to Toggle View

Amazon Uncovers Attacks Exploited Cisco ISE and Citrix NetScaler as Zero-Day Flaws. Amazon's threat intelligence team on Wednesday disclosed that it observed an advanced threat actor exploiting two then-zero-day security flaws in Cisco Identity Service Engine (ISE) and Citrix NetScaler ADC products as part of attacks designed to deliver custom malware. "This discovery highlights the trend of threat actors focusing on critical identity and network access control infrastructure – the systems enterprises rely on to enforce security policies and manage authentication across their networks," CJ Moses, CISO of Amazon Integrated Security, said in a report shared with The Hacker News. The attacks were flagged by its MadPot honeypot network, with the activity weaponizing the following two vulnerabilities - While both shortcomings have come under active exploitation in the wild, the report from Amazon sheds light on the exact nature of the attacks leveraging them. The tech giant said it detected exploitation attempts targeting CVE-2025-5777 as a zero-day, and that further investigation of the threat led to the discovery of an anomalous payload aimed at Cisco ISE appliances by weaponizing CVE-2025-20337. The activity is said to have culminated in the deployment of a custom web shell disguised as a legitimate Cisco ISE component named IdentityAuditAction. "This wasn't typical off-the-shelf malware, but rather a custom-built backdoor specifically designed for Cisco ISE environments," Moses said. The web shell comes fitted with capabilities to fly under the radar, operating entirely in memory and using Java reflection to inject itself into running threads. It also registers as a listener to monitor all HTTP requests across the Tomcat server and implements DES encryption with non-standard Base64 encoding to evade detection. Amazon described the campaign as indiscriminate, characterizing the threat actor as "highly resourced" owing to its ability to leverage multiple zero-day exploits, either by possessing advanced vulnerability research capabilities or having potential access to non-public vulnerability information. On top of that, the use of bespoke tools reflects the adversary's knowledge of enterprise Java applications, Tomcat internals, and the inner workings of Cisco ISE. The findings once again illustrate how threat actors are continuing to target network edge appliances to breach networks of interest, making it crucial that organizations limit access, through firewalls or layered access, to privileged management portals. "The pre-authentication nature of these exploits reveals that even well-configured and meticulously maintained systems can be affected," Moses said. "This underscores the importance of implementing comprehensive defense-in-depth strategies and developing robust detection capabilities that can identify unusual behavior patterns."

Daily Brief Summary

VULNERABILITIES // Amazon Identifies Zero-Day Exploits in Cisco and Citrix Systems

Amazon's threat intelligence team discovered advanced threat actors exploiting zero-day vulnerabilities in Cisco ISE and Citrix NetScaler ADC to deploy custom malware.

The vulnerabilities, identified as CVE-2025-5777 and CVE-2025-20337, were actively exploited to deliver a custom web shell disguised as a legitimate Cisco ISE component.

The malware operates entirely in memory, using Java reflection for stealth, and employs DES encryption with non-standard Base64 encoding to avoid detection.

The attacks were detected through Amazon's MadPot honeypot network, revealing the sophistication and resourcefulness of the threat actor involved.

These findings stress the need for organizations to implement defense-in-depth strategies and robust detection mechanisms to identify unusual behavior patterns.

The campaign targets critical identity and network access control infrastructure, emphasizing the vulnerability of even well-maintained systems to pre-authentication exploits.

Organizations are urged to limit access to management portals through firewalls or layered access to mitigate risks associated with such vulnerabilities.