Vulnslist

Cisco vulnerabilities by product, model, software, and advisory.

Cisco IOS XE Software for Catalyst 9800 Series Wireless Controller for Cloud Unauthenticated Access to Certificate Enrollment Service Vulnerability

cisco-sa-9800cl-openscep-SB4xtxzP · Medium · Published · Updated

A vulnerability in the Day One setup process of Cisco IOS XE Software for Catalyst 9800 Series Wireless Controllers for Cloud (9800-CL) could allow an unauthenticated, remote attacker to access the public-key infrastructure (PKI) server that is running on an affected device. This vulnerability is due to incomplete cleanup upon completion of the Day One setup process. An attacker could exploit this vulnerability by sending Simple Certificate Enrollment Protocol (SCEP) requests to an affected device. A successful exploit could allow the attacker to request a certificate from the virtual wireless controller and then use the acquired certificate to join an attacker-controlled device to the virtual wireless controller. Cisco has released software updates that address this vulnerability. There are workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-9800cl-openscep-SB4xtxzP This advisory is part of the September 2025 release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: September 2025 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication.

Cisco advisory · CSAF JSON

Workarounds

There is a workaround that addresses this vulnerability. An administrator can shut down the hostname_WLC_CA PKI server that has a hostname that matches the hostname of the wireless LAN controller (WLC). The following output shows the necessary steps to follow in an example where the WLC hostname is vewlc:

vewlc# conf t
vewlc(config)# crypto pki server vewlc_WLC_CA
vewlc(cs-server)# shutdown
vewlc(cs-server)# exit
vewlc# write memory

While this workaround has been deployed and was proven successful in a test environment, customers should determine the applicability and effectiveness in their own environment and under their own use conditions. Customers should be aware that any workaround or mitigation that is implemented may negatively impact the functionality or performance of their network based on intrinsic customer deployment scenarios and limitations. Customers should not deploy any workarounds or mitigations before first evaluating the applicability to their own environment and any impact to such environment.

CVEsCVE-2025-20293
Cisco Bug IDsCSCwh91048
CVSS ScoreBase 5.3
Base 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:X/RL:X/RC:X
Product Names From Source
Cisco IOS XE Software 16.10.1, Cisco IOS XE Software 16.10.1s, Cisco IOS XE Software 16.10.1e, Cisco IOS XE Software 16.11.1, Cisco IOS XE Software 16.11.1a, Cisco IOS XE Software 16.11.1b, Cisco IOS XE Software 16.11.1c, Cisco IOS XE Software 16.12.1, Cisco IOS XE Software 16.12.1s, Cisco IOS XE Software 16.12.3, Cisco IOS XE Software 16.12.8, Cisco IOS XE Software 16.12.2s, Cisco IOS XE Software 16.12.1t, Cisco IOS XE Software 16.12.2t, Cisco IOS XE Software 16.12.4, Cisco IOS XE Software 16.12.3s, Cisco IOS XE Software 16.12.4a, Cisco IOS XE Software 16.12.5, Cisco IOS XE Software 16.12.6, Cisco IOS XE Software 16.12.6a, Cisco IOS XE Software 16.12.7, Cisco IOS XE Software 17.1.1, Cisco IOS XE Software 17.1.1s, Cisco IOS XE Software 17.1.2, Cisco IOS XE Software 17.1.1t, Cisco IOS XE Software 17.1.3, Cisco IOS XE Software 17.2.1, Cisco IOS XE Software 17.2.1a, Cisco IOS XE Software 17.3.1, Cisco IOS XE Software 17.3.2, Cisco IOS XE Software 17.3.3, Cisco IOS XE Software 17.3.2a, Cisco IOS XE Software 17.3.4, Cisco IOS XE Software 17.3.5, Cisco IOS XE Software 17.3.6, Cisco IOS XE Software 17.3.4c, Cisco IOS XE Software 17.3.5a, Cisco IOS XE Software 17.3.5b, Cisco IOS XE Software 17.3.7, Cisco IOS XE Software 17.3.8, Cisco IOS XE Software 17.3.8a, Cisco IOS XE Software 17.4.1, Cisco IOS XE Software 17.5.1, Cisco IOS XE Software 17.5.1b, Cisco IOS XE Software 17.5.1c, Cisco IOS XE Software 17.6.1, Cisco IOS XE Software 17.6.2, Cisco IOS XE Software 17.6.3, Cisco IOS XE Software 17.6.1y, Cisco IOS XE Software 17.6.4, Cisco IOS XE Software 17.6.5, Cisco IOS XE Software 17.6.6, Cisco IOS XE Software 17.6.6a, Cisco IOS XE Software 17.6.5a, Cisco IOS XE Software 17.6.7, Cisco IOS XE Software 17.6.8, Cisco IOS XE Software 17.7.1, Cisco IOS XE Software 17.10.1, Cisco IOS XE Software 17.8.1, Cisco IOS XE Software 17.9.1, Cisco IOS XE Software 17.9.2, Cisco IOS XE Software 17.9.3, Cisco IOS XE Software 17.9.4, Cisco IOS XE Software 17.9.4a, Cisco IOS XE Software 17.11.1, Cisco IOS XE Software 17.12.1, Cisco IOS XE Software 17.12.2, Cisco IOS XE Software 17.13.1, Cisco IOS, Cisco IOS XE Software

Related Products

Product CVE Evidence
Cisco IOS CVE-2025-20293 Cisco OpenVuln
Cisco IOS XE Software CVE-2025-20293 Cisco OpenVuln
Cisco Catalyst 9600 Series Switches CVE-2025-20293 Cisco OpenVuln · software-dependent
Cisco Catalyst 9500 Series Switches CVE-2025-20293 Cisco OpenVuln · software-dependent
Cisco Catalyst 9400 Series Switches CVE-2025-20293 Cisco OpenVuln · software-dependent
Cisco Catalyst 9200 Series Switches CVE-2025-20293 Cisco OpenVuln · software-dependent
Cisco Catalyst 9300 Series Switches CVE-2025-20293 Cisco OpenVuln · software-dependent