Tracked as CVE-2025-20188, this flaw carries the highest possible severity rating-CVSS 10.0 allows unauthenticated, remote attackers to gain full control of affected devices by exploiting a hard-coded authentication token.
At the heart of the vulnerability is the Out-of-Band Access Point (AP) Image Download feature, present in several Cisco IOS XE WLC products.
The flaw arises from the presence of a hard-coded JSON Web Token (JWT) on affected systems. Attackers can exploit this by sending specially crafted HTTPS requests to the AP image download interface, bypassing authentication entirely.
Upon successful exploitation, an attacker can:
The vulnerability is classified under CWE-798: Use of Hard-coded Credentials.
The following Cisco products are vulnerable if running susceptible IOS XE releases with the Out-of-Band AP Image Download feature enabled:
Detection Command:
Administrators can check if their device is affected by running:
textshow running-config | include ap upgrade
If the output shows ap upgrade method https, the vulnerable feature is enabled.
The vulnerability’s CVSS vector is AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H, indicating:
This means exploitation can be performed remotely, without authentication or user interaction, and results in a complete compromise of the device.
No workarounds are available to fully mitigate the vulnerability without a software update.
Cisco has released free software updates to address the issue, and customers are strongly urged to upgrade immediately.
As a temporary measure, administrators can disable the Out-of-Band AP Image Download feature, which will force AP image updates to use the CAPWAP method instead-this does not affect the AP client state.
The vulnerability was discovered internally by X.B. of the Cisco Advanced Security Initiatives Group (ASIG) during routine security testing.
Cisco’s Product Security Incident Response Team (PSIRT) has found no evidence of active exploitation in the wild as of the advisory’s publication.
Given the ease of exploitation, lack of authentication, and root-level access granted by CVE-2025-20188, this vulnerability poses a significant risk to organizations relying on Cisco wireless infrastructure.
Immediate action-either by patching or disabling the vulnerable feature-is essential to protect enterprise networks from potential compromise.
For further details and software updates, Cisco customers should consult the official security advisory and use the Cisco Software Checker to verify their exposure.
Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant updates
The post Critical Cisco IOS XE Flaw Grants Attackers Full Control Over Wireless Controllers appeared first on Cyber Security News.
The U.S. Forest Service awarded Newark’s Tree Canopy Initiative $8 million to plant 2,700 trees…
Mohamed K. Abdelaal, 24, from Iselin was arrested May 20. Police charged him with criminal…
Andrea Samson, a 30-year-old ambulance volunteer in Bergen County, needs a kidney transplant. Two earlier…
Eight bald eagles got sick after they ate the bodies of euthanized farm animals at…
New Jersey’s gaming market pulled in just over $600 million during April 2026. That’s a…
Top.Domains posted on X that they sold Maestro.trade for $19,988. This is the highest reported…
This website uses cookies.