APT Exploits Cisco and Citrix Zero-Day Vulnerabilities CVE-2025-20337, CVE-2025-5777 in Coordinated Attack

Published
Written by:
Lore Apostol
Lore Apostol
Cybersecurity Writer

Key Takeaways

A sophisticated hacker group actively exploits zero-day flaws in critical enterprise infrastructure. First, Amazon's MadPot honeypot service detected exploitation attempts against Citrix. Further investigation revealed the same gang was targeting a previously undocumented endpoint in Cisco Identity Service Engine (ISE) that used vulnerable deserialization logic.

Analysis of Advanced Threat Actor Tactics

Amazon's threat intelligence division identified that the same advanced persistent threat (APT) was leveraging:

A snippet of the deserialization routine showing the actor’s extensive authentication to access their web shell
A snippet of the deserialization routine showing the actor’s extensive authentication to access their web shell | Source: AWS

The campaign is notable for the threat actor's advanced capabilities and deep technical knowledge, the report notes. Following the exploitation of the Cisco ISE vulnerability, the APT deployed a custom web shell named IdentityAuditAction. 

This backdoor was designed for stealth, operating entirely in memory to minimize forensic traces. It also used advanced evasion techniques, including Java reflection, DES encryption with non-standard Base64 encoding, and requiring specific HTTP headers for access.

The simultaneous use of multiple undisclosed zero-day exploits indicates a highly resourced and capable adversary targeting enterprise identity and network access control systems.

Enterprise Zero-Day Attack Implications

The discovery of this APT targeting enterprise systems highlights the significant risks posed by attacks on network edge appliances. The fact that the threat actor was weaponizing vulnerabilities before patches were widely available underscores the challenge of defending against such coordinated campaigns. 

Amazon recommends:

In September, a critical Cisco SNMP RCE vulnerability in iOS and iOS XE software and a critical TP-Link zero-day that exposed millions of routers to full system takeover were observed.


For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: