Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Cisco Patches 35 Vulnerabilities Across Several Products

Cisco Patches 35 Vulnerabilities Across Several Products

Posted on May 8, 2025May 8, 2025 By CWS

Cisco on Wednesday introduced patches for 35 vulnerabilities, together with 26 as a part of its semiannual IOS and IOS XE safety advisory bundle publication.

The IOS updates repair one critical-severity and 16 high-severity bugs. The crucial concern, tracked as CVE-2025-20188 (CVSS rating of 10/10), is described as an arbitrary file add flaw within the Out-of-Band Entry Level (AP) picture obtain function of IOS XE software program.

A tough-coded JSON Internet Token (JWT) permits attackers to add information by sending crafted HTTP requests to the AP picture obtain interface.

“A profitable exploit may permit the attacker to add information, carry out path traversal, and execute arbitrary instructions with root privileges,” Cisco explains in its advisory.

Whereas the safety defect could be exploited remotely, with out authentication, it solely impacts Wi-fi LAN Controllers (WLCs) which have the Out-of-Band AP picture obtain function enabled. By default, it’s disabled.

Probably the most extreme of the high-severity vulnerabilities within the semiannual safety bundle may permit distant attackers to inject instructions, trigger a denial of service (DoS) situation, or elevate their privileges.

Whereas the command injection (CVE-2025-20186) and privilege escalation (CVE-2025-20164) flaws require authentication, the DoS points (CVE-2025-20154, CVE-2025-20182, and CVE-2025-20162) could be exploited by unauthenticated attackers.

The remaining high-severity defects patched in IOS and IOS XE software program could lead on, below sure circumstances, to DoS, privilege escalation, or to the execution of persistent code at boot time.Commercial. Scroll to proceed studying.

The semiannual safety bundle additionally addresses medium-severity IOS software program flaws that could possibly be exploited to mount a cross-site request forgery (CSRF) assault, carry out SNMP operations from denied sources, bypass site visitors filters, learn configuration or operational knowledge, write arbitrary information to the system, take away arbitrary customers, or trigger a DoS situation.

On Wednesday, Cisco additionally introduced fixes for high-severity bugs within the administration API of Catalyst Middle and the CLI of Catalyst SD-WAN Supervisor that would permit attackers to change the outgoing proxy configuration settings and escalate privileges, respectively.

A number of medium-severity vulnerabilities had been additionally addressed with the Catalyst Middle and Catalyst SD-WAN Supervisor updates.

Moreover, the tech big introduced that no patches will probably be launched for CVE-2025-20137, a medium-severity bypass within the entry management listing (ACL) programming of Catalyst 1000 and Catalyst 2960L switches, as a result of the weak configuration will not be supported.

“This vulnerability is because of using each an IPv4 ACL and a dynamic ACL of IP Supply Guard on the identical interface, which is an unsupported configuration. An attacker may exploit this vulnerability by trying to ship site visitors by an affected system,” Cisco says.

Cisco says it’s not conscious of any of those vulnerabilities being exploited within the wild. Nevertheless, it warns that proof-of-concept (PoC) code concentrating on two medium-severity points (CVE-2025-20221, a site visitors filter bypass in IOS XE SD-WAN; and CVE-2025-20147, an XSS flaw in Catalyst SD-WAN Supervisor) exists.

On Wednesday, Cisco additionally up to date the listing of merchandise affected by the crucial Erlang/OTP SSH safety defect disclosed in mid-April, in addition to the standing of patches. Tracked as CVE-2025-32433 (CVSS rating of 10) and exploitable with out authentication, the flaw results in distant code execution (RCE).

Customers are suggested to use the accessible patches and workarounds as quickly as potential. Further info could be discovered on Cisco’s safety advisories web page.

Associated: Cisco Patches 10 Vulnerabilities in IOS XR

Associated: Vulnerabilities Patched in Atlassian, Cisco Merchandise

Associated: Vulnerabilities Expose Cisco Meraki and ECE Merchandise to DoS Assaults

Associated: Hackers Goal Cisco Good Licensing Utility Vulnerabilities

Security Week News Tags:Cisco, Patches, Products, Vulnerabilities

Post navigation

Previous Post: Dozens of SysAid Instances Vulnerable to Remote Hacking
Next Post: MirrorFace Targets Japan and Taiwan with ROAMINGMOUSE and Upgraded ANEL Malware

Related Posts

PwC and Google Cloud Ink 0 Million Deal to Scale AI-Powered Defense PwC and Google Cloud Ink $400 Million Deal to Scale AI-Powered Defense Security Week News
Critical Vulnerability Patched in jsPDF Critical Vulnerability Patched in jsPDF Security Week News
Sandworm Mode: New NPM Supply Chain Attack Uncovered Sandworm Mode: New NPM Supply Chain Attack Uncovered Security Week News
Fraud Prevention Firm Resistant AI Raises  Million Fraud Prevention Firm Resistant AI Raises $25 Million Security Week News
EU Unveils AI Code of Practice to Help Businesses Comply With Bloc’s Rules EU Unveils AI Code of Practice to Help Businesses Comply With Bloc’s Rules Security Week News
Firefox 145 and Chrome 142 Patch High-Severity Flaws in Latest Releases Firefox 145 and Chrome 142 Patch High-Severity Flaws in Latest Releases Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required
  • Iranian Hackers Compromise FBI Director’s Email, Attack Stryker
  • Stocks in Cybersecurity Dip as Anthropic Tests Cutting-Edge AI

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required
  • Iranian Hackers Compromise FBI Director’s Email, Attack Stryker
  • Stocks in Cybersecurity Dip as Anthropic Tests Cutting-Edge AI

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark