Cisco has patched a critical flaw in its IOS XE Software for Wireless LAN Controllers. The vulnerability, due to hardcoded tokens, allows threat actors to upload files, perform path traversal, and execute arbitrary commands with root privileges. The flaw is tracked as CVE-2025-20188 and has a maximum security score of 10/10. Although there is no evidence of abuse in the wild yet, users should patch immediately. Vulnerable devices include Catalyst 9800-CL Wireless Controllers for Cloud and other Catalyst 9800 series controllers.
TPRM report: https://scoringcyber.rankiteo.com/company/cisco
"id": "cis221051225",
"linkid": "cisco",
"type": "Vulnerability",
"date": "5/2025",
"severity": "100",
"impact": "5",
"explanation": "Attack threatening the organization's existence"
{'affected_entities': [{'industry': 'Networking',
'name': 'Cisco',
'type': 'Technology Company'}],
'attack_vector': ['File Upload',
'Path Traversal',
'Arbitrary Command Execution'],
'description': 'Cisco has patched a critical flaw in its IOS XE Software for '
'Wireless LAN Controllers. The vulnerability, due to hardcoded '
'tokens, allows threat actors to upload files, perform path '
'traversal, and execute arbitrary commands with root '
'privileges. The flaw is tracked as CVE-2025-20188 and has a '
'maximum security score of 10/10. Although there is no '
'evidence of abuse in the wild yet, users should patch '
'immediately. Vulnerable devices include Catalyst 9800-CL '
'Wireless Controllers for Cloud and other Catalyst 9800 series '
'controllers.',
'impact': {'systems_affected': ['Catalyst 9800-CL Wireless Controllers for '
'Cloud',
'Catalyst 9800 series controllers']},
'post_incident_analysis': {'corrective_actions': 'Patching',
'root_causes': 'Hardcoded tokens'},
'recommendations': 'Users should patch immediately.',
'response': {'remediation_measures': 'Patching'},
'title': 'Cisco IOS XE Software for Wireless LAN Controllers Vulnerability',
'type': 'Vulnerability Exploitation',
'vulnerability_exploited': 'CVE-2025-20188'}