Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Cisco IOS XE Wireless Controllers Vulnerability Enables Full Device Control for Attackers

Posted on May 8, 2025May 9, 2025 By CWS

Cisco has disclosed a essential safety vulnerability in its IOS XE Wi-fi LAN Controllers that would enable unauthorized attackers to achieve full management of affected gadgets.

The flaw, assigned the utmost severity ranking of 10.0, permits unauthenticated distant attackers to add arbitrary information, traverse directories, and execute instructions with root privileges on affected methods.

The vulnerability, tracked as CVE-2025-20188, resides within the Out-of-Band Entry Level (AP) Picture Obtain characteristic of Cisco IOS XE Software program for Wi-fi LAN Controllers (WLCs).

In line with Cisco’s safety advisory launched on Could 7, the flaw stems from “the presence of a hard-coded JSON Net Token (JWT) on an affected system”.

Safety researchers word that attackers can exploit this vulnerability by sending specifically crafted HTTPS requests to the AP picture obtain interface.

When efficiently exploited, attackers achieve the power to add malicious information to arbitrary areas and execute instructions with the best system privileges.

“This vulnerability represents a big danger to enterprise networks utilizing affected Cisco wi-fi controllers,” stated a cybersecurity skilled aware of the difficulty. “The mixture of distant entry, no authentication necessities, and root-level command execution makes this flaw notably harmful.”

Affected Merchandise

The vulnerability impacts a number of Cisco merchandise operating weak variations of IOS XE Software program with the Out-of-Band AP Picture Obtain characteristic enabled:

Catalyst 9800-CL Wi-fi Controllers for Cloud

Catalyst 9800 Embedded Wi-fi Controller for Catalyst 9300, 9400, and 9500 Sequence Switches

Catalyst 9800 Sequence Wi-fi Controllers

Embedded Wi-fi Controller on Catalyst APs

Directors can decide if their gadgets are weak by utilizing the command “present running-config | embody ap improve” – if it returns “ap improve methodology https,” the system is affected.

Cisco has launched software program updates that tackle this vulnerability, and clients are strongly urged to improve instantly. The corporate states there aren’t any workarounds for this concern, however as a brief mitigation, directors can disable the weak characteristic.

“Organizations ought to prioritize patching this vulnerability instantly,” stated one other safety analyst. “In environments the place quick patching isn’t attainable, disabling the Out-of-Band AP Picture Obtain characteristic is essential till updates will be utilized.”

Safety bulletin info signifies the vulnerability was found internally by X.B. of the Cisco Superior Safety Initiatives Group throughout safety testing. In line with Cisco’s advisory, there may be at present no proof of energetic exploitation within the wild.

This vulnerability disclosure comes as a part of Cisco’s Could 2025 Semiannual IOS and IOS XE Software program Safety Advisory Bundled Publication, which incorporates fixes for a number of safety points in Cisco merchandise.

Cyber Security News Tags:Attackers, Cisco, Control, Controllers, Device, Enables, Full, IOS, Vulnerability, Wireless

Post navigation

Previous Post: Top Ransomware Actors Actively Attacking Financial Sector, 406 Incidents Publicly Disclosed
Next Post: Cisco Patches CVE-2025-20188 (10.0 CVSS) in IOS XE That Enables Root Exploits via JWT

Related Posts

Hackers Use ClickFix Technique to Deploy NetSupport RAT via Compromised WordPress Sites Cyber Security News
Threat Actors Weaponizing .hwp Files to Deliver RokRAT Malware Cyber Security News
APT SideWinder Actor Profile – Recent Attacks, Tactics, Techniques, and Procedures Cyber Security News
Ukraine Hackers Claimed Cyberattack on Major Russian Drone Supplier Cyber Security News
Chinese Silk Typhoon Hackers Filed 10+ Patents for Highly Intrusive Hacking Tools Cyber Security News
Intel Websites Exploited to Hack Every Intel Employee and View Confidential Data Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • A Free Zero Trust Web Application Firewall for 2026
  • How Businesses Stop Complex Social Engineering Attacks Early
  • GPT-5 Has a Vulnerability: Its Router Can Send You to Older, Less Safe Models
  • Slow and Steady Security: Lessons from the Tortoise and the Hare
  • Elastic Refutes Claims of Zero-Day in EDR Product

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • A Free Zero Trust Web Application Firewall for 2026
  • How Businesses Stop Complex Social Engineering Attacks Early
  • GPT-5 Has a Vulnerability: Its Router Can Send You to Older, Less Safe Models
  • Slow and Steady Security: Lessons from the Tortoise and the Hare
  • Elastic Refutes Claims of Zero-Day in EDR Product

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News