Close Menu
globalcrimedesk.comglobalcrimedesk.com
    What's Hot

    Holy See: Review Vatican-China Agreement

    DEA Ends Body Camera Program After Trump Executive Order — ProPublica

    India-Pakistan Conflict: How to De-Escalate

    Facebook X (Twitter) Instagram
    Trending
    • Holy See: Review Vatican-China Agreement
    • DEA Ends Body Camera Program After Trump Executive Order — ProPublica
    • India-Pakistan Conflict: How to De-Escalate
    • iClicker site hack targeted students with malware via fake CAPTCHA
    • UK immigration has seen a trend over the last 30 years
    • ‘A cocktail for a misinformed world’: why China and Russia are cheering Trump’s attacks on media | World Press Freedom Day 2025
    • ‘Who suffered the most?’: Fear and fatigue in Kashmir after ceasefire | India-Pakistan Tensions News
    • White House, Qatar discuss transfer of luxury jet for Air Force One
    Facebook X (Twitter) Instagram
    globalcrimedesk.comglobalcrimedesk.com
    • Home
    • Cyber
    • Global
    • Law
    • Mafia
    • Prevention
    • Scandals
    • Terror
    • Trafficking
    globalcrimedesk.comglobalcrimedesk.com
    Home»Cyber»Cisco fixes max severity IOS XE flaw letting attackers hijack devices
    Cyber

    Cisco fixes max severity IOS XE flaw letting attackers hijack devices

    mediamillion1000@gmail.comBy [email protected]May 11, 2025No Comments3 Mins Read
    Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
    Follow Us
    Google News Flipboard
    Cisco fixes max severity IOS XE flaw letting attackers hijack devices
    Share
    Facebook Twitter LinkedIn Pinterest Email Copy Link

    Cisco fixes max severity IOS XE flaw letting attackers hijack devices

    Cisco has fixed a maximum severity flaw in IOS XE Software for Wireless LAN Controllers by a hard-coded JSON Web Token (JWT) that allows an unauthenticated remote attacker to take over devices.

    This token is meant to authenticate requests to a feature called ‘Out-of-Band AP Image Download.’ Since it’s hard-coded, anyone can impersonate an authorized user without credentials.

    The vulnerability is tracked as CVE-2025-20188 and has a maximum 10.0 CVSS score, allowing threat actors to fully compromise devices according to the vendor.

    “An attacker could exploit this vulnerability by sending crafted HTTPS requests to the AP image download interface,” reads Cisco’s bulletin.

    “A successful exploit could allow the attacker to upload files, perform path traversal, and execute arbitrary commands with root privileges.”

    It is noted that CVE-2025-20188 is only exploitable when the ‘Out-of-Band AP Image Download’ feature is enabled on the device, which isn’t enabled by default.

    The ‘Out-of-Band AP Image Download’ feature allows access points (APs) to download OS images via HTTPS rather than over the CAPWAP protocol, allowing a more flexible and direct way to get firmware onto APs.

    That said, although it’s disabled by default, some large-scale or automated enterprise deployments may enable it for faster provisioning or recovery of APs.

    The following devices are vulnerable to attacks if the exploitation requirements are met:

    • Catalyst 9800-CL Wireless Controllers for Cloud
    • Catalyst 9800 Embedded Wireless Controller for Catalyst 9300, 9400, and 9500 Series Switches
    • Catalyst 9800 Series Wireless Controllers
    • Embedded Wireless Controller on Catalyst APs

    On the other hand, products confirmed not to be impacted by the hard-coded JWT issue are: Cisco IOS (non-XE), Cisco IOS XR, Cisco Meraki products, Cisco NX-OS, and Cisco AireOS-based WLCs.

    Cisco has released security updates to address the critical vulnerability, so system administrators are advised to apply them as soon as possible.

    Users can determine the exact version that fixes the flaw for their device using the Cisco Software Checker for their specific device model.

    Although there are no mitigations or workarounds for CVE-2025-20188, disabling the ‘Out-of-Band AP Image Download’ feature is a solid defense.

    At this time, Cisco is unaware of any cases of active exploitation for CVE-2025-20188. However, given the severity of the issue, threat actors are likely to start scanning for exposed vulnerable endpoints immediately.

    Red Report 2025

    Based on an analysis of 14M malicious actions, discover the top 10 MITRE ATT&CK techniques behind 93% of attacks and how to defend against them.

    Attackers Cisco devices fixes flaw hijack IOS letting max severity
    Follow on Google News Follow on Flipboard
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
    Previous ArticleSir Ian McGeechan: Former Scotland and British and Irish Lions head coach says he has prostate cancer
    Next Article Dumped cabinet minister Ed Husic promises ‘constructive’ backbench role after fiery attack on Marles | Australian politics
    [email protected]
    • Website

    Related Posts

    iClicker site hack targeted students with malware via fake CAPTCHA

    May 12, 2025

    TikTok in trouble at home after spat over the price of jade • The Register

    May 12, 2025

    Think Twice Before Creating That ChatGPT Action Figure

    May 12, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Latest Posts

    Holy See: Review Vatican-China Agreement

    DEA Ends Body Camera Program After Trump Executive Order — ProPublica

    India-Pakistan Conflict: How to De-Escalate

    iClicker site hack targeted students with malware via fake CAPTCHA

    Trending Posts

    Holy See: Review Vatican-China Agreement

    May 12, 2025

    DEA Ends Body Camera Program After Trump Executive Order — ProPublica

    May 12, 2025

    India-Pakistan Conflict: How to De-Escalate

    May 12, 2025

    Subscribe to News

    Get the latest sports news from NewsSite about world, sports and politics.

    News

    • Cyber
    • Global
    • Law
    • Mafia
    • Prevention

    Company

    • About Us
    • Disclaimer
    • Get In Touch
    • Privacy policy
    • Terms & Condition
    Recent Posts
    • Holy See: Review Vatican-China Agreement
    • DEA Ends Body Camera Program After Trump Executive Order — ProPublica

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    © 2025 globalcrimedesk. Designed by Pro.
    Facebook X (Twitter) Pinterest Vimeo WhatsApp TikTok Instagram

    Type above and press Enter to search. Press Esc to cancel.