Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Why researchers are developing robots that look and act like bats

Data centers currently attract more investment than finding new sources of oil supply

Lawmakers warn Democratic governors that states are sharing driver data with ICE

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Amazon discovers zero-day flaw in attacks exploiting Cisco ISE and Citrix NetScaler
Identity

Amazon discovers zero-day flaw in attacks exploiting Cisco ISE and Citrix NetScaler

userBy userNovember 12, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

November 12, 2025Ravi LakshmananNetwork security/zero day

Amazon’s threat intelligence team revealed Wednesday that it observed sophisticated threat actors exploiting two then-current zero-day security flaws in Cisco Identity Service Engine (ISE) and Citrix NetScaler ADC products as part of an attack aimed at delivering custom malware.

“This discovery highlights a trend in threat actors’ focus on critical identity and network access control infrastructure, the systems that enterprises rely on to enforce security policies and manage authentication across networks,” CJ Moses, CISO at Amazon Integrated Security, said in a report shared with The Hacker News.

This attack was alerted to by the MadPot honeypot network and leveraged two vulnerabilities:

CVE-2025-5777 or Citrix Bleed 2 (CVSS Score: 9.3) – Insufficient input validation vulnerability in Citrix NetScaler ADC and Gateway that could be exploited by an attacker to bypass authentication. (Fixed by Citrix in June 2025) CVE-2025-20337 (CVSS Score: 10.0) – An unauthenticated remote code execution vulnerability in Cisco Identity Services Engine (ISE) and Cisco ISE Passive Identity Connector (ISE-PIC) could allow a remote attacker to execute arbitrary code as root on the underlying operating system. (Fixed by Cisco in July 2025)

Both flaws have been exploited in the wild, but Amazon’s report reveals the exact nature of the attacks that leverage them.

DFIR retainer service

The tech giant said it detected an exploitation attempt targeting CVE-2025-5777 as a zero-day and further investigation into the threat discovered an anomalous payload that weaponized CVE-2025-20337 and targeted Cisco ISE appliances. This activity allegedly culminated in the introduction of a custom web shell masquerading as a legitimate Cisco ISE component named IdentityAuditAction.

“This was not typical off-the-shelf malware, but a custom-built backdoor designed specifically for the Cisco ISE environment,” Moses said.

The web shell has the ability to operate under the radar, operating entirely in memory and using Java reflection to inject itself into a running thread. It also registers as a listener to monitor all HTTP requests across the Tomcat server and implements DES encryption with non-standard Base64 encoding to avoid detection.

Amazon describes the campaign as being indiscriminate and characterizes the attackers as “sophisticated and resourceful” due to their ability to leverage multiple zero-day exploits, as they have advanced vulnerability research capabilities or may have access to non-public vulnerability information. Additionally, the use of custom tools reflects the attacker’s knowledge of enterprise Java applications, the internal structure of Tomcat, and the inner workings of Cisco ISE.

Our findings reiterate that attackers continue to target network edge appliances to infiltrate targeted networks, making it important for organizations to restrict access to privileged management portals through firewalls and tiered access.

“The pre-authenticated nature of these exploits makes it clear that even well-configured and meticulously maintained systems can be affected,” said Moses. “This highlights the importance of implementing a comprehensive defense-in-depth strategy and developing robust detection capabilities that can identify anomalous behavior patterns.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleEPA proposes smarter PFAS reporting rules
Next Article Google sues China-based hackers behind $1 billion Lighthouse phishing platform
user
  • Website

Related Posts

Google sues China-based hackers behind $1 billion Lighthouse phishing platform

November 12, 2025

[Webinar] See how leading security teams use DASR to reduce attack surface exposure

November 12, 2025

Why critical infrastructure needs strong security

November 12, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Why researchers are developing robots that look and act like bats

Data centers currently attract more investment than finding new sources of oil supply

Lawmakers warn Democratic governors that states are sharing driver data with ICE

Google sues China-based hackers behind $1 billion Lighthouse phishing platform

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Meet Your Digital Twin: Europe’s Cutting-Edge AI is Personalizing Medicine

TwinH: The AI Game-Changer for Faster, More Accessible Legal Services

Immortality is No Longer Science Fiction: TwinH’s AI Breakthrough Could Change Everything

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.