Skip to content

Cisco IOS XE Software Vulnerability - 20250508001

Overview

The WA SOC has been made aware of a critical vulnerability in Cisco products.

The vulnerability in the Out-of-Band Access Point (AP) Image Download feature of Cisco IOS XE Software for Wireless LAN Controllers (WLCs) could allow an unauthenticated, remote threat actor to upload arbitrary files to an affected system.

This vulnerability is due to the presence of a hard-coded JSON Web Token (JWT) on an affected system. Threat actor could exploit this vulnerability by sending crafted HTTPS requests to the AP image download interface. A successful exploit could allow file uploads, path traversals, and the execution of arbitrary commands with root privileges.

What is vulnerable?

Product(s) Affected Version(s) CVE CVSS Severity
Cisco IOS XE Software affected at 17.7.1
affected at 17.10.1
affected at 17.10.1b
affected at 17.8.1 
affected at 17.9.1
affected at 17.9.2 
affected at 17.9.3 
affected at 17.9.4
affected at 17.9.5  
affected at 17.9.4a
affected at 17.11.1
affected at 17.12.1 
affected at 17.12.2 
affected at 17.12.3 
affected at 17.13.1
affected at 17.14.1 
affected at 17.11.99SW 
CVE-2025-20188 10.0 Critical

What has been observed?

There is no evidence of exploitation affecting Western Australian Government networks at the time of publishing.

Recommendation

The WA SOC recommends administrators apply the solutions as per vendor instructions to all affected devices within expected timeframe of 48 hours... (refer Patch Management):