Metrics
Affected Vendors & Products
Mon, 23 Jun 2025 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Cisco
Cisco ios Xe |
|
CPEs | cpe:2.3:o:cisco:ios_xe:17.11.1:*:*:*:*:*:*:* cpe:2.3:o:cisco:ios_xe:17.11.99sw:*:*:*:*:*:*:* cpe:2.3:o:cisco:ios_xe:17.12.1:*:*:*:*:*:*:* cpe:2.3:o:cisco:ios_xe:17.12.2:*:*:*:*:*:*:* cpe:2.3:o:cisco:ios_xe:17.12.3:*:*:*:*:*:*:* cpe:2.3:o:cisco:ios_xe:17.13.1:*:*:*:*:*:*:* cpe:2.3:o:cisco:ios_xe:17.14.1:*:*:*:*:*:*:* |
|
Vendors & Products |
Cisco
Cisco ios Xe |
Fri, 06 Jun 2025 16:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability in the Out-of-Band Access Point (AP) Image Download feature of Cisco IOS XE Software for Wireless LAN Controllers (WLCs) could allow an unauthenticated, remote attacker to upload arbitrary files to an affected system. This vulnerability is due to the presence of a hard-coded JSON Web Token (JWT) on an affected system. An attacker could exploit this vulnerability by sending crafted HTTPS requests to the AP image download interface. A successful exploit could allow the attacker to upload files, perform path traversal, and execute arbitrary commands with root privileges. Note: For exploitation to be successful, the Out-of-Band AP Image Download feature must be enabled on the device. It is not enabled by default. | A vulnerability in the Out-of-Band Access Point (AP) Image Download, the Clean Air Spectral Recording, and the client debug bundles features of Cisco IOS XE Software for Wireless LAN Controllers (WLCs) could allow an unauthenticated, remote attacker to upload arbitrary files to an affected system. This vulnerability is due to the presence of a hard-coded JSON Web Token (JWT) on an affected system. An attacker could exploit this vulnerability by sending crafted HTTPS requests to the AP file upload interface. A successful exploit could allow the attacker to upload files, perform path traversal, and execute arbitrary commands with root privileges. |
Wed, 04 Jun 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
ssvc
|
ssvc
|
Wed, 07 May 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 07 May 2025 17:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability in the Out-of-Band Access Point (AP) Image Download feature of Cisco IOS XE Software for Wireless LAN Controllers (WLCs) could allow an unauthenticated, remote attacker to upload arbitrary files to an affected system. This vulnerability is due to the presence of a hard-coded JSON Web Token (JWT) on an affected system. An attacker could exploit this vulnerability by sending crafted HTTPS requests to the AP image download interface. A successful exploit could allow the attacker to upload files, perform path traversal, and execute arbitrary commands with root privileges. Note: For exploitation to be successful, the Out-of-Band AP Image Download feature must be enabled on the device. It is not enabled by default. | |
Weaknesses | CWE-798 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: cisco
Published: 2025-05-07T17:34:36.871Z
Updated: 2025-06-06T16:24:05.256Z
Reserved: 2024-10-10T19:15:13.226Z
Link: CVE-2025-20188

Updated: 2025-05-07T18:57:20.691Z

Status : Analyzed
Published: 2025-05-07T18:15:38.617
Modified: 2025-06-23T15:15:11.117
Link: CVE-2025-20188

No data.