Original Article Text

Click to Toggle View

Cisco fixes max severity IOS XE flaw letting attackers hijack devices. Cisco has fixed a maximum severity flaw in IOS XE Software for Wireless LAN Controllers by a hard-coded JSON Web Token (JWT) that allows an unauthenticated remote attacker to take over devices. This token is meant to authenticate requests to a feature called 'Out-of-Band AP Image Download.' Since it's hard-coded, anyone can impersonate an authorized user without credentials. The vulnerability is tracked as CVE-2025-20188 and has a maximum 10.0 CVSS score, allowing threat actors to fully compromise devices according to the vendor. "An attacker could exploit this vulnerability by sending crafted HTTPS requests to the AP image download interface," reads Cisco's bulletin. "A successful exploit could allow the attacker to upload files, perform path traversal, and execute arbitrary commands with root privileges." It is noted that CVE-2025-20188 is only exploitable when the 'Out-of-Band AP Image Download' feature is enabled on the device, which isn't enabled by default. The 'Out-of-Band AP Image Download' feature allows access points (APs) to download OS images via HTTPS rather than over the CAPWAP protocol, allowing a more flexible and direct way to get firmware onto APs. That said, although it's disabled by default, some large-scale or automated enterprise deployments may enable it for faster provisioning or recovery of APs. The following devices are vulnerable to attacks if the exploitation requirements are met: On the other hand, products confirmed not to be impacted by the hard-coded JWT issue are: Cisco IOS (non-XE), Cisco IOS XR, Cisco Meraki products, Cisco NX-OS, and Cisco AireOS-based WLCs. Cisco has released security updates to address the critical vulnerability, so system administrators are advised to apply them as soon as possible. Users can determine the exact version that fixes the flaw for their device using the Cisco Software Checker for their specific device model. Although there are no mitigations or workarounds for CVE-2025-20188, disabling the 'Out-of-Band AP Image Download' feature is a solid defense. At this time, Cisco is unaware of any cases of active exploitation for CVE-2025-20188. However, given the severity of the issue, threat actors are likely to start scanning for exposed vulnerable endpoints immediately. Top 10 MITRE ATT&CK© Techniques Behind 93% of Attacks Based on an analysis of 14M malicious actions, discover the top 10 MITRE ATT&CK techniques behind 93% of attacks and how to defend against them.

Daily Brief Summary

MALWARE // Cisco Addresses Critical Flaw in IOS XE That Could Hijack Devices

Cisco has patched a critical vulnerability in IOS XE Software impacting Wireless LAN Controllers.

The flaw, identified as CVE-2025-20188, could allow unauthenticated attackers to fully control devices via a hard-coded JSON Web Token.

The vulnerability, with a CVSS score of 10.0, enables severe actions like file uploading, path traversal, and arbitrary command execution with root privileges.

Exploitation is possible only when the 'Out-of-Band AP Image Download' feature is enabled, which is not the default setting.

The affected feature facilitates OS image downloads over HTTPS, beneficial for certain large or automated enterprise setups.

Vulnerable devices include various Cisco products, while Cisco IOS (non-XE), Cisco IOS XR, Meraki, NX-OS, and AireOS-based WLCs are not affected.

Although no active exploitations are reported, the severity of the issue calls for immediate update application as per Cisco’s advisories, with no available mitigations other than disabling the affected feature.

Cisco urges users to check their device versions against the Cisco Software Checker to ensure security.