A threat actor Group is actively exploiting two zero-day vulnerabilities in widely deployed enterprise security tools : Cisco Identity Services Engine (CVE-2025-20337) and Citrix NetScaler ADC & Gateway (CVE-2025-5777). According to Amazon’s threat intelligence team, the attackers leveraged these flaws to implant a custom in-memory web shell, granting them stealthy persistence and elevated privileges within targeted networks.
Affected Products
- Cisco ISE and ISE Passive Identity Connector — allows unauthenticated remote code execution (RCE) as root.
- Citrix NetScaler ADC & Gateway — contains an insufficient input validation flaw enabling authentication bypass.
Who Is At Risk
- Enterprises using Cisco ISE for identity and access management (IAM) and Citrix NetScaler for application delivery and network edge access.
- Organizations with network-edge devices exposed to the Internet or accessible via management portals.
- Teams managing privileged infrastructure (admins, network operators, identity teams) where these appliances are used.
Attack Vector & Capabilities
- The attackers exploited two zero-day vulnerabilities before they were publicly disclosed or patched, giving them early and stealthy access.
- After breaching the systems, they deployed a custom in-memory web shell called IdentityAuditAction, designed to operate without leaving files on disk.
- The web shell used Java reflection and Tomcat monitoring to intercept and analyse incoming web traffic.
- It employed DES encryption, custom Base64 encoding, and hidden HTTP header triggers to communicate covertly and avoid detection.
- The operation specifically targeted identity management and network-edge systems, aiming for long-term persistence and deep enterprise infiltration.
Why This Matters
- These vulnerabilities allow attackers to strike before login or authentication, meaning even systems thought to be secure can be exposed.
- Cisco ISE and Citrix NetScaler sit at the core of enterprise networks, managing who gets access and how data flows. A successful attack on them can undermine the entire security framework of an organization.
- The combination of zero-day exploits and custom-built tools shows that a highly skilled, well-funded group is behind this campaign , raising the risk of targeted breaches and supply chain–style compromises.
Recommendation
Apply Security Patches Now
- Cisco: Update Identity Services Engine (ISE/I-PIC) to fix CVE-2025-20337.
- Citrix: Update NetScaler ADC & Gateway to fix CVE-2025-5777.
Restrict Management Access
- Disable or limit Internet-facing access to ISE, NetScaler, and related devices.
- Use firewalls or VPNs so only trusted internal networks can reach management ports.
Improve Monitoring and Detection
- Check logs for unusual HTTP requests or unknown connections to your appliances.
- Monitor for unexpected processes or in-memory activity on these systems.
- Use endpoint or network monitoring tools to detect suspicious movement.
Verify System Integrity
- Look for unauthorized changes in configurations, admin accounts, or linked systems (like Active Directory or GitHub).
- Keep regular backups and perform configuration audits.
Boost Incident Readiness
- Treat this as a critical security incident — engage your response teams and educate IT and network staff on the risks and ensure alerts from these systems are reviewed immediately.






.png)
.png)