Skip to main content

Cisco Releases May 2025 IOS XE Software Security Advisory Bundled Publication

Bundled publication contains 20 security advisories, including one critical vulnerability

Report a cyber attack: call 0300 303 5222 or email [email protected]

Summary

Bundled publication contains 20 security advisories, including one critical vulnerability


Affected platforms

The following platforms are known to be affected:

The following platforms are also known to be affected:

Additional Cisco products are affected; please see individual advisories listed in the bundled publication.

Threat details

Proof-of-concept exploit released for CVE-2025-20188

Security researchers have published a public proof-of-concept exploit for CVE-2025-20188. The NHS England National CSOC assesses exploitation of this vulnerability as more likely.


Introduction

Cisco has released 20 security advisories that describe 26 vulnerabilities in Cisco IOS Software and Cisco IOS XE Software. Cisco IOS (internetwork operating system) is the operating system used on Networking devices. Cisco IOS XE is a modular version of that operating system, used on newer enterprise networking devices.

Cisco has released software updates that address these vulnerabilities. One critical and two high severity vulnerabilities are highlighted below.


Vulnerability Details

  • CVE-2025-20188 has a CVSSv3 score of 10.0 and is within the out-of-band access point download feature. If successfully exploited, a remote unauthenticated attacker could upload arbitrary files to an affected system.
  • CVE-2025-20186 has a CVSSv3 score of 8.8 and is within the web-based management interface of the wireless LAN controller feature. If successfully exploited, a remote, authenticated attacker could perform command injection. The attacker must have access to a lobby ambassador user account.
  • CVE-2025-20164 has a CVSSv3 score of 8.3 and is in the Cisco industrial ethernet switch device manager. If successfully exploited, a remote, authenticated attacker could elevate privileges. The attacker must have valid credentials for a user account with privilege level 5 or higher.

Cisco's May 2025 IOS XE Software Security Advisory Bundled Publication describes a further 23 vulnerabilities in 17 advisories, comprising 10 high and 7 medium security impact ratings.


Threat updates

Date Update
30 May 2025 Proof-of-concept exploit released for CVE-2025-20188

Remediation advice

Affected organisations are encouraged to review Cisco's May 2025 IOS XE Software Security Advisory Bundled Publication and apply the relevant updates as soon as practicable.

The security advisories below relate to the previous highlighted vulnerabilities.


Remediation steps

Type Step
Patch

Cisco IOS XE Wireless Controller Software Arbitrary File Upload Vulnerability | cisco-sa-wlc-file-uplpd-rHZG9UfC


https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wlc-file-uplpd-rHZG9UfC
Patch

Cisco IOS XE Software Web-Based Management Interface Command Injection Vulnerability | cisco-sa-webui-cmdinj-gVn3OKNC


https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webui-cmdinj-gVn3OKNC
Patch

Cisco IOS Software Industrial Ethernet Switch Device Manager Privilege Escalation Vulnerability | cisco-sa-ios-http-privesc-wCRd5e3


https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-http-privesc-wCRd5e3


CVE Vulnerabilities

Last edited: 30 May 2025 10:42 am