First published: Wed May 07 2025(Updated: )
A vulnerability in the Out-of-Band Access Point (AP) Image Download feature of Cisco IOS XE Software for Wireless LAN Controllers (WLCs) could allow an unauthenticated, remote attacker to upload arbitrary files to an affected system. This vulnerability is due to the presence of a hard-coded JSON Web Token (JWT) on an affected system. An attacker could exploit this vulnerability by sending crafted HTTPS requests to the AP image download interface. A successful exploit could allow the attacker to upload files, perform path traversal, and execute arbitrary commands with root privileges. Note: For exploitation to be successful, the Out-of-Band AP Image Download feature must be enabled on the device. It is not enabled by default.
Credit: psirt@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS XE |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-20188 has been classified as critical due to the risk of remote file uploads by unauthenticated attackers.
To fix CVE-2025-20188, ensure that you upgrade to the latest version of Cisco IOS XE Software that is not vulnerable.
CVE-2025-20188 affects Cisco IOS XE Software operating on Wireless LAN Controllers.
Yes, CVE-2025-20188 can be exploited by an unauthenticated remote attacker.
The potential impacts of CVE-2025-20188 include unauthorized file uploads, which could lead to further compromise of affected systems.