Close Menu
World Forbes – Business, Tech, AI & Global Insights
  • Home
  • AI
  • Billionaires
  • Business
  • Cybersecurity
  • Education
    • Innovation
  • Money
  • Small Business
  • Sports
  • Trump
What's Hot

Online rise of Eastern Orthodoxy tests its clergy

December 12, 2025

Hanukkah is Judaism’s ‘festival of lights’

December 12, 2025

Skydiver dangles at 15,000 feet after parachute tangles on plane’s tail

December 12, 2025
Facebook X (Twitter) Instagram
Trending
  • Online rise of Eastern Orthodoxy tests its clergy
  • Hanukkah is Judaism’s ‘festival of lights’
  • Skydiver dangles at 15,000 feet after parachute tangles on plane’s tail
  • Buenos Aires dance hall guarantees tango sessions with pro partners
  • UNESCO gives a shout-out to Switzerland’s yodeling by adding it to list of cultural heritage
  • Rare Dom Pérignon champagne from Charles and Diana’s wedding to be auctioned in Denmark
  • Chase Sui Wonders detoured from Harvard astrophysics to ‘The Studio’
  • Advice for introverts who dread office holiday parties
World Forbes – Business, Tech, AI & Global InsightsWorld Forbes – Business, Tech, AI & Global Insights
Friday, December 12
  • Home
  • AI
  • Billionaires
  • Business
  • Cybersecurity
  • Education
    • Innovation
  • Money
  • Small Business
  • Sports
  • Trump
World Forbes – Business, Tech, AI & Global Insights
Home » Cisco Patches 35 Vulnerabilities Across Several Products
Cybersecurity

Cisco Patches 35 Vulnerabilities Across Several Products

By adminMay 8, 2025No Comments3 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email
Post Views: 173


Cisco on Wednesday announced patches for 35 vulnerabilities, including 26 as part of its semiannual IOS and IOS XE security advisory bundle publication.

The IOS updates fix one critical-severity and 16 high-severity bugs. The critical issue, tracked as CVE-2025-20188 (CVSS score of 10/10), is described as an arbitrary file upload flaw in the Out-of-Band Access Point (AP) image download feature of IOS XE software.

A hard-coded JSON Web Token (JWT) allows attackers to upload files by sending crafted HTTP requests to the AP image download interface.

“A successful exploit could allow the attacker to upload files, perform path traversal, and execute arbitrary commands with root privileges,” Cisco explains in its advisory.

While the security defect can be exploited remotely, without authentication, it only impacts Wireless LAN Controllers (WLCs) that have the Out-of-Band AP image download feature enabled. By default, it is disabled.

The most severe of the high-severity vulnerabilities in the semiannual security bundle could allow remote attackers to inject commands, cause a denial of service (DoS) condition, or elevate their privileges.

While the command injection (CVE-2025-20186) and privilege escalation (CVE-2025-20164) flaws require authentication, the DoS issues (CVE-2025-20154, CVE-2025-20182, and CVE-2025-20162) can be exploited by unauthenticated attackers.

The remaining high-severity defects patched in IOS and IOS XE software could lead, under certain conditions, to DoS, privilege escalation, or to the execution of persistent code at boot time.

Advertisement. Scroll to continue reading.

The semiannual security bundle also addresses medium-severity IOS software flaws that could be exploited to mount a cross-site request forgery (CSRF) attack, perform SNMP operations from denied sources, bypass traffic filters, read configuration or operational data, write arbitrary files to the system, remove arbitrary users, or cause a DoS condition.

On Wednesday, Cisco also announced fixes for high-severity bugs in the management API of Catalyst Center and the CLI of Catalyst SD-WAN Manager that could allow attackers to modify the outgoing proxy configuration settings and escalate privileges, respectively.

Multiple medium-severity vulnerabilities were also addressed with the Catalyst Center and Catalyst SD-WAN Manager updates.

Additionally, the tech giant announced that no patches will be released for CVE-2025-20137, a medium-severity bypass in the access control list (ACL) programming of Catalyst 1000 and Catalyst 2960L switches, because the vulnerable configuration is not supported.

“This vulnerability is due to the use of both an IPv4 ACL and a dynamic ACL of IP Source Guard on the same interface, which is an unsupported configuration. An attacker could exploit this vulnerability by attempting to send traffic through an affected device,” Cisco says.

Cisco says it is not aware of any of these vulnerabilities being exploited in the wild. However, it warns that proof-of-concept (PoC) code targeting two medium-severity issues (CVE-2025-20221, a traffic filter bypass in IOS XE SD-WAN; and CVE-2025-20147, an XSS flaw in Catalyst SD-WAN Manager) exists.

On Wednesday, Cisco also updated the list of products affected by the critical Erlang/OTP SSH security defect disclosed in mid-April, as well as the status of patches. Tracked as CVE-2025-32433 (CVSS score of 10) and exploitable without authentication, the flaw leads to remote code execution (RCE).

Users are advised to apply the available patches and workarounds as soon as possible. Additional information can be found on Cisco’s security advisories page.

Related: Cisco Patches 10 Vulnerabilities in IOS XR

Related: Vulnerabilities Patched in Atlassian, Cisco Products

Related: Vulnerabilities Expose Cisco Meraki and ECE Products to DoS Attacks

Related: Hackers Target Cisco Smart Licensing Utility Vulnerabilities



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
admin
  • Website

Related Posts

O2 Service Vulnerability Exposed User Location

May 20, 2025

Madhu Gottumukkala Officially Announced as CISA Deputy Director

May 20, 2025

BreachRx Lands $15 Million as Investors Bet on Breach-Workflow Software

May 19, 2025

Printer Company Procolored Served Infected Software for Months

May 19, 2025

UK Legal Aid Agency Finds Data Breach Following Cyberattack

May 19, 2025

480,000 Catholic Health Patients Impacted by Serviceaide Data Leak

May 19, 2025
Add A Comment
Leave A Reply

Don't Miss
Billionaires

Kalshi’s Cofounder Is Now World’s Youngest Self-Made Woman Billionaire

December 2, 2025

Kalshi is now worth $11 billion, making both its founders billionaires and Luana Lopes Lara…

Billionaire Kwek Leng Beng’s CDL Expands In London With $370 Million Holiday Inn Deal

December 2, 2025

Credo, The Maker Of Purple Cables That Connect Data Centers, Mints Two New Billionaires

December 1, 2025

How A Tiny Polish Startup Became The Multi-Billion-Dollar Voice Of AI

December 1, 2025
Our Picks

Online rise of Eastern Orthodoxy tests its clergy

December 12, 2025

Hanukkah is Judaism’s ‘festival of lights’

December 12, 2025

Skydiver dangles at 15,000 feet after parachute tangles on plane’s tail

December 12, 2025

Buenos Aires dance hall guarantees tango sessions with pro partners

December 12, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

About Us
About Us

Welcome to World-Forbes.com
At World-Forbes.com, we bring you the latest insights, trends, and analysis across various industries, empowering our readers with valuable knowledge. Our platform is dedicated to covering a wide range of topics, including sports, small business, business, technology, AI, cybersecurity, and lifestyle.

Our Picks

After Klarna, Zoom’s CEO also uses an AI avatar on quarterly call

May 23, 2025

Anthropic CEO claims AI models hallucinate less than humans

May 22, 2025

Anthropic’s latest flagship AI sure seems to love using the ‘cyclone’ emoji

May 22, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Facebook X (Twitter) Instagram Pinterest
  • Home
  • About Us
  • Advertise With Us
  • Contact Us
  • DMCA Policy
  • Privacy Policy
  • Terms & Conditions
© 2025 world-forbes. Designed by world-forbes.

Type above and press Enter to search. Press Esc to cancel.