Close Menu
Pineapples Update –Pineapples Update –

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    What is MicroSD Express? Everything You Need To Know

    June 8, 2025

    5 to avoid pressure washing mistakes

    June 8, 2025

    Spain vs Portugal Live Stream: How to see the Rashtra League Final 2025 from anywhere and for free

    June 8, 2025
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Pineapples Update –Pineapples Update –
    • Home
    • Gaming
    • Gadgets
    • Startups
    • Security
    • How-To
    • AI/ML
    • Apps
    • Web3
    Pineapples Update –Pineapples Update –
    Home»Security»Maximum severity exploitation details for Cisco iOS XE Dosha now public now
    Security

    Maximum severity exploitation details for Cisco iOS XE Dosha now public now

    PineapplesUpdateBy PineapplesUpdateMay 31, 2025No Comments3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Maximum severity exploitation details for Cisco iOS XE Dosha now public now
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Maximum severity exploitation details for Cisco iOS XE Dosha now public now

    Technical details about maximum-seriousness Cisco iOS XE WLC have been tracked as an arbitrary file upload defect CVE-2025-20188, made publicly available, bringing us closer to a working exploitation.

    Horizon3 does not have the ‘Ready-to-Run’ evidence of the concept RCE explute script by researchers, but it provides sufficient information for an LLM to fill a skilled attacker or even missing pieces.

    Given the immediate risk of weapons and comprehensive use in attacks, it is recommended that the affected users take action to protect their closing points now.

    Cisco iOS XE WLC Dosha

    Cisco revealed significant defects in iOS XE software for wireless lan controllers on May 7, 2025, allowing an attacker to handle equipment.

    The seller stated that it is caused by a hard-coded JSON web token (JWT) that allows an informal, remote attacker to upload files, travelers, travelers and perform arbitrary commands with root privileges.

    Bulletin stated that CVE-2025-20188 is only dangerous when the ‘out-of-band AP image download’ facility is capable on the device, in the event, in which, the following devices are at risk:

    • Catalyst 9800-CL Wireless Controller for Cloud
    • Catalyst 9800 Cataly
    • Catalyst 9800 series wireless controller
    • Embedded wireless controller on catalyst AP

    An attack of Kshitij 3

    Horizon 3 Analysis Shows that defects are present due to the hardcoded JWT Folwaccrate (“NOTFOND”) used by the backnd Lua script for joint upload andpoints with insufficient path verification.

    In particular, the backnd uses the Openresti (Lua + Nginx) script to validate the JWT tokens and handle the file upload, but if the ‘/TMP/NGINX_JWT_Key’ file is missing, then the script returns to “NotFound” as a mystery to verify the script JWTS.

    This originally allows the attackers to generate legitimate tokens without knowing any secrets using ‘HS256’ and ‘Notfound’.

    The example of Horizon3 sends an HTTP post request with the file uploads on ‘/AP_SPEC_REC/’ endpoint through port 8443 and uses file name traverse to release a spontaneous file (foo.txt) outside the intended directory.

    Request JWT to reproduce JWT using Notfound Secret Key
    Request JWT to reproduce JWT using Notfound Secret Key
    Source: Horizon 3

    To increase the file upload defect for remote code execution, the attacker can direct the configuration files loaded by backand services, drop web shells, or misuse files to trigger unauthorized tasks.

    The example of Kshitij 3 misuses ‘Pvp.sh’ service that monitors specific directors, depending on it, it depends, and triggers a re -load to run the attacker command.

    Given the high risk of exploitation, users are recommended to upgrade to a patched version (17.12.04 or new) at the earliest.

    As a temporary work-round, the admins can turn off out-of-band image download feature to close the weak service.


    Red Report 2025

    Based on the analysis of 14M malicious tasks, search for the top 10 MITERAT & CK techniques behind the 93% attacks and how to defend them against them.

    Cisco details Dosha exploitation iOS maximum Public severity
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleI improved my cheap smart TV look with these tweex
    Next Article 5 Projects Perplexity New Labs AI Tools can now whip for you – in minutes
    PineapplesUpdate
    • Website

    Related Posts

    Security

    Remove project directors presented as malicious NPM package utilities

    June 8, 2025
    Security

    Supply series attacks Glustac NPM package with 960K weekly download

    June 7, 2025
    How-To

    iPhone users say that mail app is suddenly cold with iOS 18.5 – here a fix you can try

    June 7, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Microsoft’s new text editor is a VIM and Nano option

    May 19, 2025594 Views

    The best luxury car for buyers for the first time in 2025

    May 19, 2025536 Views

    Massives Datenleck in Cloud-Spichenn | CSO online

    May 19, 2025465 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    Meta delay entrusts ‘Bhamoth’ AI model, Openi and Google more than one more head start

    May 16, 20250 Views

    The OURA ring found a new rival with just one titanium design and 24/7 biometric tracking – no membership is required

    May 16, 20250 Views

    Filecoin, Lockheed Martin Test IPFS in space

    May 16, 20250 Views
    Our Picks

    What is MicroSD Express? Everything You Need To Know

    June 8, 2025

    5 to avoid pressure washing mistakes

    June 8, 2025

    Spain vs Portugal Live Stream: How to see the Rashtra League Final 2025 from anywhere and for free

    June 8, 2025

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms And Conditions
    • Disclaimer
    © 2025 PineapplesUpdate. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.