Cisco

Cisco

A critical security vulnerability in Cisco IOS XE Wireless Controller Software has been identified, allowing attackers to achieve remote code execution with root privileges. The flaw stems from a hard-coded JSON Web Token (JWT) present in the Out-of-Band Access Point (AP) Image Download feature. This vulnerability affects multiple enterprise-grade wireless controller products, including Catalyst 9800-CL Wireless Controllers for Cloud, Catalyst 9800 Embedded Wireless Controllers, and Catalyst 9800 Series Wireless Controllers. The vulnerability, tracked as CVE-2025-20188, has been assigned the maximum CVSS score of 10.0, highlighting its severe impact on affected systems.

Source: https://cybersecuritynews.com/cisco-ios-xe-vulnerability-poc/

TPRM report: https://scoringcyber.rankiteo.com/company/cisco

"id": "cis719053025",
"linkid": "cisco",
"type": "Vulnerability",
"date": "5/2025",
"severity": "100",
"impact": "5",
"explanation": "Attack threatening the organization's existence"
{'affected_entities': [{'industry': 'Networking Equipment',
                        'name': 'Cisco',
                        'size': 'Large Enterprise',
                        'type': 'Technology Company'}],
 'attack_vector': 'Remote Code Execution',
 'date_detected': '2025-05-07',
 'date_publicly_disclosed': '2025-05-07',
 'description': 'A critical security vulnerability in Cisco IOS XE Wireless '
                'Controller Software allows unauthenticated remote attackers '
                'to achieve remote code execution with root privileges.',
 'impact': {'systems_affected': ['Catalyst 9800-CL Wireless Controllers for '
                                 'Cloud',
                                 'Catalyst 9800 Embedded Wireless Controllers '
                                 'for Catalyst 9300/9400/9500 Series Switches',
                                 'Catalyst 9800 Series Wireless Controllers',
                                 'Embedded Wireless Controller on Catalyst '
                                 'APs']},
 'initial_access_broker': {'backdoors_established': 'Hard-coded JWT secret '
                                                    "'notfound'",
                           'entry_point': '/aparchive/upload and '
                                          '/ap_spec_rec/upload/',
                           'high_value_targets': 'Enterprise-grade wireless '
                                                 'controllers'},
 'lessons_learned': 'Immediate patching and auditing of wireless '
                    'infrastructure to identify exposed systems.',
 'motivation': 'System Compromise',
 'post_incident_analysis': {'corrective_actions': 'Software updates and '
                                                  'disabling vulnerable '
                                                  'features',
                            'root_causes': 'Hard-coded JWT present in the '
                                           'Out-of-Band Access Point (AP) '
                                           'Image Download feature'},
 'recommendations': 'Organizations should disable the Out-of-Band AP Image '
                    'Download feature and apply software updates.',
 'references': [{'date_accessed': '2025-05-07', 'source': 'Cisco Disclosure'}],
 'response': {'containment_measures': 'Disable the Out-of-Band AP Image '
                                      'Download feature',
              'remediation_measures': 'Software updates and patches'},
 'title': 'Cisco IOS XE Wireless Controller Software Vulnerability',
 'type': 'Software Vulnerability',
 'vulnerability_exploited': 'CVE-2025-20188'}
Great! Next, complete checkout for full access to Rankiteo Blog.
Welcome back! You've successfully signed in.
You've successfully subscribed to Rankiteo Blog.
Success! Your account is fully activated, you now have access to all content.
Success! Your billing info has been updated.
Your billing was not updated.