Cisco has patched a worrying flaw which could have let attackers hijack devices


- Cisco has patched a 10/10 flaw in IOS XE Software for Wireless LAN Controllers
- The flaw was due to hardcoded tokens
- There is no evidence of abuse in the wild (yet)
Cisco has released a patch for a maximum-severity flaw found in its IOS XE Software for Wireless LAN Controllers which could have allowed threat actors to take over vulnerable endpoints.
The flaw is yet another case of hardcoded credentials, this time in the form of a JSON Web Token (JWT). “An attacker could exploit this vulnerability by sending crafted HTTPS requests to the AP image download interface,” it is explained in the NVD website. “A successful exploit could allow the attacker to upload files, perform path traversal, and execute arbitrary commands with root privileges.”
The vulnerability is now tracked as CVE-2025-20188, and has the maximum security score – 10/10 (critical).
No mitigations
It was also noted that the vulnerability can only be exploited on devices that have the Out-of-Band Image Download feature enabled which, on default settings, is not the case.
According to BleepingComputer, this is a feature that allows access points to download OS images via HTTPS instead of CAPWAP, which is a somewhat more flexible and direct way of getting firmware onto access points.
The publication says that while it’s off by default, some large-scale or automated enterprise deployments have turned it on.
Unfortunately, there are no mitigations for the flaw. The best way to minimize the risk of exposure is to deploy the patch. A possible workaround is to disable the Out-of-Band Image Download feature, which could work well if the enterprise isn’t actually using it.
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
Cisco said it hasn’t seen evidence of in-the-wild abuse just yet, but users should still be on their guard.
Here is a list of vulnerable devices:
Catalyst 9800-CL Wireless Controllers for Cloud
Catalyst 9800 Embedded Wireless Controller for Catalyst 9300, 9400, and 9500 Series Switches
Catalyst 9800 Series Wireless Controllers
Embedded Wireless Controller on Catalyst APs
And here is a list of devices that are safe to use:
Cisco IOS (non-XE)
Cisco IOS XR
Cisco Meraki products
Cisco NX-OS
Cisco AireOS-based WLCs
You might also like
Cisco has patched a 10/10 flaw in IOS XE Software for Wireless LAN Controllers The flaw was due to hardcoded tokens There is no evidence of abuse in the wild (yet) Cisco has released a patch for a maximum-severity flaw found in its IOS XE Software for Wireless LAN Controllers…
Recent Posts
- Is the world’s largest CCTV surveillance camera vendor going to be the next Huawei? Canada bans Hikvision amidst security fears
- NYT Wordle today — answer and my hints for game #1475, Thursday, July 3
- Racist videos made with AI are going viral on TikTok
- This is probably the most powerful rugged laptop ever built – and you can even add a barcode scanner
- Blizzard is winding down support for its Warcraft mobile game
Archives
- July 2025
- June 2025
- May 2025
- April 2025
- March 2025
- February 2025
- January 2025
- December 2024
- November 2024
- October 2024
- September 2024
- August 2024
- July 2024
- June 2024
- May 2024
- April 2024
- March 2024
- February 2024
- January 2024
- December 2023
- November 2023
- October 2023
- September 2023
- August 2023
- July 2023
- June 2023
- May 2023
- April 2023
- March 2023
- February 2023
- January 2023
- December 2022
- November 2022
- October 2022
- September 2022
- August 2022
- July 2022
- June 2022
- May 2022
- April 2022
- March 2022
- February 2022
- January 2022
- December 2021
- November 2021
- October 2021
- September 2021
- August 2021
- July 2021
- June 2021