Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Cisco Patches CVE-2025-20188 (10.0 CVSS) in IOS XE That Enables Root Exploits via JWT

Posted on May 8, 2025May 8, 2025 By CWS

Could 08, 2025Ravie LakshmananVulnerability / Community Safety

Cisco has launched software program fixes to deal with a maximum-severity safety flaw in its IOS XE Wi-fi Controller that would allow an unauthenticated, distant attacker to add arbitrary recordsdata to a inclined system.
The vulnerability, tracked as CVE-2025-20188, has been rated 10.0 on the CVSS scoring system.
“This vulnerability is as a result of presence of a hard-coded JSON Internet Token (JWT) on an affected system,” the corporate mentioned in a Wednesday advisory.

“An attacker may exploit this vulnerability by sending crafted HTTPS requests to the AP picture obtain interface. A profitable exploit may enable the attacker to add recordsdata, carry out path traversal, and execute arbitrary instructions with root privileges.”
That mentioned, to ensure that the exploitation to achieve success, the Out-of-Band AP Picture Obtain function have to be enabled on the gadget. It is disabled by default.
The next merchandise are affected, if they’ve a susceptible launch operating and have the Out-of-Band AP Picture Obtain function turned on –

Catalyst 9800-CL Wi-fi Controllers for Cloud
Catalyst 9800 Embedded Wi-fi Controller for Catalyst 9300, 9400, and 9500 Sequence Switches
Catalyst 9800 Sequence Wi-fi Controllers
Embedded Wi-fi Controller on Catalyst APs

Whereas updating to the most recent model is one of the best plan of action, as short-term mitigations, customers can disable the function till an improve will be carried out.
“With this function disabled, AP picture obtain will use the CAPWAP technique for the AP picture replace function, and this doesn’t affect the AP shopper state,” Cisco added.
The networking gear main credited X.B. of the Cisco Superior Safety Initiatives Group (ASIG) for locating the reporting the bug throughout inside safety testing. There is no such thing as a proof that the vulnerability has been maliciously exploited within the wild.

Discovered this text fascinating? Observe us on Twitter  and LinkedIn to learn extra unique content material we publish.

The Hacker News Tags:Cisco, CVE202520188, CVSS, Enables, Exploits, IOS, JWT, Patches, Root

Post navigation

Previous Post: Cisco IOS XE Wireless Controllers Vulnerability Enables Full Device Control for Attackers
Next Post: Russian Hackers Using ClickFix Fake CAPTCHA to Deploy New LOSTKEYS Malware

Related Posts

Microsoft Discloses Exchange Server Flaw Enabling Silent Cloud Access in Hybrid Setups The Hacker News
New Android Malware Surge Hits Devices via Overlays, Virtualization Fraud and NFC Theft The Hacker News
PyPI Warns of Ongoing Phishing Campaign Using Fake Verification Emails and Lookalike Domain The Hacker News
Fortinet Releases Patch for Critical SQL Injection Flaw in FortiWeb (CVE-2025-25257) The Hacker News
How Top CISOs Save Their SOCs from Alert Chaos to Never Miss Real Incidents The Hacker News
Chrome 0-Day, Ivanti Exploits, MacOS Stealers, Crypto Heists and More The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • RapperBot Botnet Disrupted, American Administrator Indicted
  • Discover and Control Shadow AI Agents in Your Enterprise Before Hackers Do
  • Flaws in Software Used by Hundreds of Cities and Towns Exposed Sensitive Data
  • RingReaper Malware Attacking Linux Servers Evading EDR Solutions
  • Turning BIA Insights Into Resilient Recovery

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • RapperBot Botnet Disrupted, American Administrator Indicted
  • Discover and Control Shadow AI Agents in Your Enterprise Before Hackers Do
  • Flaws in Software Used by Hundreds of Cities and Towns Exposed Sensitive Data
  • RingReaper Malware Attacking Linux Servers Evading EDR Solutions
  • Turning BIA Insights Into Resilient Recovery

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News