devxlogo

cisco patches critical IOS XE wireless controllers flaw

Cisco Patch
Cisco Patch

Cisco has released patches for 35 vulnerabilities across several of its products. This includes 26 vulnerabilities that were part of the company’s semiannual IOS and IOS XE security advisory bundle. One of the most serious issues is a critical vulnerability, CVE-2025-20188, which affects the Out-of-Band Access Point (AP) image download feature in IOS XE software.

This flaw has a CVSS score of 10 out of 10. It could allow attackers to upload files, perform path traversal, and execute commands with root privileges without needing authentication. However, the feature is not enabled by default and only impacts certain Wireless LAN Controllers (WLCs).

The updates also fix 16 high-severity bugs in IOS and IOS XE software. These include issues that could lead to command injection (CVE-2025-20186), privilege escalation (CVE-2025-20164), and several denial of service conditions (CVE-2025-20154, CVE-2025-20182, and CVE-2025-20162).

Patching critical IOS XE flaws

The command injection and privilege escalation flaws require authentication to exploit, but the DoS vulnerabilities can be triggered remotely without authentication. Cisco’s patches also address medium-severity vulnerabilities in IOS that could enable cross-site request forgery attacks, allow bypassing traffic filters, permit reading or writing files, and cause DoS situations. Additional high-severity flaws were fixed in the management API of Catalyst Center and the CLI of Catalyst SD-WAN Manager.

These bugs could let attackers modify proxy settings and escalate privileges. Multiple medium-severity issues in both Catalyst Center and SD-WAN Manager were remediated as well. Cisco will not be releasing a patch for CVE-2025-20137, a medium-severity access control bypass in some Catalyst switch models, as the configuration needed to exploit it is unsupported.

See also  Hassett Rebukes New York Fed Study

While there are no known exploits in the wild for these vulnerabilities, proof-of-concept code exists for two of the medium-severity flaws (CVE-2025-20221 and CVE-2025-20147). Users should apply the available patches and workarounds as soon as possible to protect their systems. More details can be found in Cisco’s security advisories on their website.

Image Credits: Photo by Christopher Gower on Unsplash

Johannah Lopez is a versatile professional who seamlessly navigates two worlds. By day, she excels as a SaaS freelance writer, crafting informative and persuasive content for tech companies. By night, she showcases her vibrant personality and customer service skills as a part-time bartender. Johannah's ability to blend her writing expertise with her social finesse makes her a well-rounded and engaging storyteller in any setting.

About Our Editorial Process

At DevX, we’re dedicated to tech entrepreneurship. Our team closely follows industry shifts, new products, AI breakthroughs, technology trends, and funding announcements. Articles undergo thorough editing to ensure accuracy and clarity, reflecting DevX’s style and supporting entrepreneurs in the tech sphere.

See our full editorial policy.