- Cisco has patched a 10/10 error in iOS XE Software for wireless LAN CONTROLLERS
- The error was due to hard -coded tokens
- There is no evidence of abuse in nature (yet)
Cisco has released a patch for an error in maximum severity found in its iOS XE software for wireless LAN controllers that could have enabled threat players to take over vulnerable end points.
The error is another case of hard -coded credentials, this time in the form of a JSON -web -Token (JWT). “An striker could take advantage of this vulnerability by sending designed HTTPS requests to the AP image transfer interface,” it is explained on the NVD website. “Successful exploitation could allow the striker to upload files, perform the path review and perform arbitrary commands with root privileges.”
Vulnerability is now traced as CVE-2025-20188 and has the maximum security score-10/10 (critical).
No mitigations
It was also noted that the vulnerability can only be utilized on devices that have the function outside the tape that is activated, which is not the case with default settings.
According to Bleeping computerThis is a feature that provides access points to download us images via https instead of Capwap, which is a somewhat more flexible and direct way to get firmware at access points.
The publication says that although it has been off by default, some large or automated business installations have turned on it.
Unfortunately, there is no meal for the error. The best way to minimize the risk of exposure is to implement the patch. One possible solution is to disable the function outside the tape, which can work well if the company does not actually use it.
Cisco said it has not yet seen evidence of abuse of wild, but users still need to be on their guard.
Here is a list of vulnerable devices:
Catalyst 9800-CL wireless controllers to cloud
Catalyst 9800 Embedded Wireless Controller for Catalyst 9300, 9400 and 9500 Series Switches
Catalyst 9800 -Serie Wireless Controllers
Nested Wireless Controller at Catalyst ApS
And here is a list of devices that are safe to use:
Cisco iOS (non-XE)
Cisco iOS XR
Cisco Meraki products
Cisco NX-OS
Cisco Aireos-based WLCS