{"id":483,"date":"2025-06-03T21:16:25","date_gmt":"2025-06-03T19:16:25","guid":{"rendered":"https:\/\/blog.digitalonion.ly\/?p=483"},"modified":"2025-06-03T21:16:26","modified_gmt":"2025-06-03T19:16:26","slug":"exploit-details-for-max-severity-cisco-ios-xe-flaw-now-public","status":"publish","type":"post","link":"https:\/\/blog.digitalonion.ly\/?p=483&lang=en","title":{"rendered":"Exploit details for max severity Cisco IOS XE flaw now public"},"content":{"rendered":"\n<p><\/p>\n\n\n\n<p>Technical details about a maximum-severity Cisco IOS XE WLC arbitrary file upload flaw tracked as CVE-2025-20188 have been made publicly available, bringing us closer to a working exploit. <\/p>\n\n\n\n<p>The write-up by Horizon3 researchers does not contain a &#8216;ready-to-run&#8217; proof of concept RCE exploit script, but it does provide enough information for a skilled attacker or even an LLM to fill in the missing pieces. <\/p>\n\n\n\n<p>Given the immediate risk of weaponization and widespread use in attacks, it is recommended that impacted users take action now to protect their endpoints. <\/p>\n\n\n\n<p>The\u00a0Cisco IOS XE WLC flaw Cisco\u00a0disclosed\u00a0the critical flaw in IOS XE Software for Wireless LAN Controllers on May 7, 2025, which allows\u00a0an attacker to take over devices. <\/p>\n\n\n\n<p>The vendor said it is caused by a hard-coded JSON Web Token (JWT) that allows an unauthenticated, remote attacker to upload files, perform path traversal, and execute arbitrary commands with root privileges. <\/p>\n\n\n\n<p>The bulletin noted that CVE-2025-20188 is only dangerous when the &#8216;Out-of-Band AP Image Download&#8217; feature is enabled on the device, in which case, the following device models are at risk: Catalyst 9800-CL Wireless Controllers for Cloud Catalyst 9800 Embedded Wireless Controller for Catalyst 9300, 9400, and 9500 Series Switches Catalyst 9800 Series Wireless Controllers Embedded Wireless Controller on Catalyst APs Horizon3&#8217;s attack example Horizon3&#8217;s\u00a0analysis\u00a0shows that the flaw exists due to a hardcoded JWT fallback secret (&#8220;notfound&#8221;) used by the backend Lua scripts for upload endpoints combined with insufficient path validation.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Contact us : <a href=\"tel:00218915579536\u202c\">0915579536\u202c<\/a><\/p>\n\n\n\n<p>Or on the website <a href=\"http:\/\/digitalonion.ly\" target=\"_blank\" rel=\"noreferrer noopener\">digitalonion.ly<\/a><\/p>\n\n\n\n<p><strong>Visit us at our company address: Tripoli \u2013 Andalus Street \u2013 Next to the Iraqi Embassy.<\/strong><\/p>\n\n\n\n<p><a href=\"https:\/\/maps.app.goo.gl\/xtDNpMSSfVe7zC9t9?fbclid=IwZXh0bgNhZW0CMTAAAR0agjJLdY1fw8Svc0z1ODqZbUdA7iBvh0QACYyoRcdYQ4NGTYHbZ6bQGtg_aem_klwdVZms8wjhcVBzxmkYtw\">Company address on the map<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Technical details about a maximum-severity Cisco IOS XE WLC arbitrary file upload flaw tracked as [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":484,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false},"version":2}},"categories":[81],"tags":[],"class_list":["post-483","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security-news"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/blog.digitalonion.ly\/wp-content\/uploads\/2025\/06\/Untitled-1.jpeg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.digitalonion.ly\/index.php?rest_route=\/wp\/v2\/posts\/483","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.digitalonion.ly\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.digitalonion.ly\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.digitalonion.ly\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.digitalonion.ly\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=483"}],"version-history":[{"count":1,"href":"https:\/\/blog.digitalonion.ly\/index.php?rest_route=\/wp\/v2\/posts\/483\/revisions"}],"predecessor-version":[{"id":485,"href":"https:\/\/blog.digitalonion.ly\/index.php?rest_route=\/wp\/v2\/posts\/483\/revisions\/485"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.digitalonion.ly\/index.php?rest_route=\/wp\/v2\/media\/484"}],"wp:attachment":[{"href":"https:\/\/blog.digitalonion.ly\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=483"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.digitalonion.ly\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=483"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.digitalonion.ly\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=483"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}