Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Cisco Patches CVE-2025-20188 (10.0 CVSS) in IOS XE That Enables Root Exploits via JWT

Posted on May 8, 2025May 8, 2025 By CWS

Could 08, 2025Ravie LakshmananVulnerability / Community Safety

Cisco has launched software program fixes to deal with a maximum-severity safety flaw in its IOS XE Wi-fi Controller that would allow an unauthenticated, distant attacker to add arbitrary recordsdata to a inclined system.
The vulnerability, tracked as CVE-2025-20188, has been rated 10.0 on the CVSS scoring system.
“This vulnerability is as a result of presence of a hard-coded JSON Internet Token (JWT) on an affected system,” the corporate mentioned in a Wednesday advisory.

“An attacker may exploit this vulnerability by sending crafted HTTPS requests to the AP picture obtain interface. A profitable exploit may enable the attacker to add recordsdata, carry out path traversal, and execute arbitrary instructions with root privileges.”
That mentioned, to ensure that the exploitation to achieve success, the Out-of-Band AP Picture Obtain function have to be enabled on the gadget. It is disabled by default.
The next merchandise are affected, if they’ve a susceptible launch operating and have the Out-of-Band AP Picture Obtain function turned on –

Catalyst 9800-CL Wi-fi Controllers for Cloud
Catalyst 9800 Embedded Wi-fi Controller for Catalyst 9300, 9400, and 9500 Sequence Switches
Catalyst 9800 Sequence Wi-fi Controllers
Embedded Wi-fi Controller on Catalyst APs

Whereas updating to the most recent model is one of the best plan of action, as short-term mitigations, customers can disable the function till an improve will be carried out.
“With this function disabled, AP picture obtain will use the CAPWAP technique for the AP picture replace function, and this doesn’t affect the AP shopper state,” Cisco added.
The networking gear main credited X.B. of the Cisco Superior Safety Initiatives Group (ASIG) for locating the reporting the bug throughout inside safety testing. There is no such thing as a proof that the vulnerability has been maliciously exploited within the wild.

Discovered this text fascinating? Observe us on Twitter  and LinkedIn to learn extra unique content material we publish.

The Hacker News Tags:Cisco, CVE202520188, CVSS, Enables, Exploits, IOS, JWT, Patches, Root

Post navigation

Previous Post: Cisco IOS XE Wireless Controllers Vulnerability Enables Full Device Control for Attackers
Next Post: Russian Hackers Using ClickFix Fake CAPTCHA to Deploy New LOSTKEYS Malware

Related Posts

New HTTPBot Botnet Launches 200+ Precision DDoS Attacks on Gaming and Tech Sectors The Hacker News
Nation-State Hacks, Spyware Alerts, Deepfake Malware, Supply Chain Backdoors The Hacker News
Why Exposed Credentials Remain Unfixed—and How to Change That The Hacker News
Why top SOC teams are shifting to Network Detection and Response The Hacker News
How to Automate CVE and Vulnerability Advisory Response with Tines The Hacker News
Commvault CVE-2025-34028 Added to CISA KEV After Active Exploitation Confirmed The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Remove Malware From Your PC
  • How to Recover From a Data Breach
  • BreachRx Lands $15 Million as Investors Bet on Breach-Workflow Software
  • Printer Company Procolored Served Infected Software for Months
  • RVTools Official Site Hacked to Deliver Bumblebee Malware via Trojanized Installer

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2025

Recent Posts

  • How to Remove Malware From Your PC
  • How to Recover From a Data Breach
  • BreachRx Lands $15 Million as Investors Bet on Breach-Workflow Software
  • Printer Company Procolored Served Infected Software for Months
  • RVTools Official Site Hacked to Deliver Bumblebee Malware via Trojanized Installer

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News