Cisco IOS XE Software Vulnerability - 20250508001¶
Overview¶
The WA SOC has been made aware of a critical vulnerability in Cisco products.
The vulnerability in the Out-of-Band Access Point (AP) Image Download feature of Cisco IOS XE Software for Wireless LAN Controllers (WLCs) could allow an unauthenticated, remote threat actor to upload arbitrary files to an affected system.
This vulnerability is due to the presence of a hard-coded JSON Web Token (JWT) on an affected system. Threat actor could exploit this vulnerability by sending crafted HTTPS requests to the AP image download interface. A successful exploit could allow file uploads, path traversals, and the execution of arbitrary commands with root privileges.
What is vulnerable?¶
Product(s) Affected | Version(s) | CVE | CVSS | Severity |
---|---|---|---|---|
Cisco IOS XE Software | affected at 17.7.1 affected at 17.10.1 affected at 17.10.1b affected at 17.8.1 affected at 17.9.1 affected at 17.9.2 affected at 17.9.3 affected at 17.9.4 affected at 17.9.5 affected at 17.9.4a affected at 17.11.1 affected at 17.12.1 affected at 17.12.2 affected at 17.12.3 affected at 17.13.1 affected at 17.14.1 affected at 17.11.99SW |
CVE-2025-20188 | 10.0 | Critical |
What has been observed?¶
There is no evidence of exploitation affecting Western Australian Government networks at the time of publishing.
Recommendation¶
The WA SOC recommends administrators apply the solutions as per vendor instructions to all affected devices within expected timeframe of 48 hours... (refer Patch Management):