Vulnslist

Cisco vulnerabilities by product, model, software, and advisory.

Cisco IOS XE Wireless Controller Software Cisco Discovery Protocol Denial of Service Vulnerability

cisco-sa-ewlc-cdp-dos-fpeks9K · High · Published · Updated

A vulnerability in Cisco IOS XE Wireless Controller Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient input validation of access point (AP) Cisco Discovery Protocol (CDP) neighbor reports when they are processed by the wireless controller. An attacker could exploit this vulnerability by sending a crafted CDP packet to an AP. A successful exploit could allow the attacker to cause an unexpected reload of the wireless controller that is managing the AP, resulting in a DoS condition that affects the wireless network. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ewlc-cdp-dos-fpeks9K This advisory is part of the May 2025 release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: May 2025 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication.

Cisco advisory · CSAF JSON

Workarounds

There are no workarounds that address this vulnerability.

However, if CDP is not required on the AP, an administrator can disable CDP on every AP profile from either the web-based management GUI or CLI.

Disable AP CDP from the Web-Based Management GUI

To disable the AP CDP from the web-based management GUI, use the following steps:

Choose Configuration > Tags & Profiles > AP Join.
For every AP profile that is configured on the device, click the profile name, then choose Management > CDP Interface.
Set the CDP State to Disabled.

Disable AP CDP from the Management CLI

To disable the AP CDP from the management CLI on the wireless controller, use the following steps:

Confirm the AP profile names using the show ap ap-join-profile summary command, as shown in the following example:

WLC#show ap ap-join-profile summary

Number of AP Profiles: 2
AP Profile Name Description
------------------------------------------------------------------------
new-ap-profile
default-ap-profile default ap profile

Enter configuration mode. For every AP Join profile, enter the no cdp command, as shown in the following example:

WLC#conf t
Enter configuration commands, one per line. End with CNTL/Z.
WLC(config)#ap profile new-ap-profile
WLC(config-ap-profile)#no cdp
WLC(config-ap-profile)#ap profile default-ap-profile
WLC(config-ap-profile)#no cdp
WLC(config-ap-profile)#end

To verify the configuration, see the instructions in the Vulnerable Products ["#vp"] section of this advisory.

While this mitigation has been deployed and was proven successful in a test environment, customers should determine the applicability and effectiveness in their own environment and under their own use conditions. Customers should be aware that any workaround or mitigation that is implemented may negatively impact the functionality or performance of their network based on intrinsic customer deployment scenarios and limitations. Customers should not deploy any workarounds or mitigations before first evaluating the applicability to their own environment and any impact to such environment.

CVEsCVE-2025-20202
Cisco Bug IDsCSCwm14282
CVSS ScoreBase 7.4
Base 7.4 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H/E:X/RL:X/RC:X
Product Names From Source
Cisco IOS XE Software 16.10.1, Cisco IOS XE Software 16.10.1s, Cisco IOS XE Software 16.10.1e, Cisco IOS XE Software 16.11.1, Cisco IOS XE Software 16.11.1a, Cisco IOS XE Software 16.11.1b, Cisco IOS XE Software 16.11.1c, Cisco IOS XE Software 16.12.1, Cisco IOS XE Software 16.12.1s, Cisco IOS XE Software 16.12.3, Cisco IOS XE Software 16.12.8, Cisco IOS XE Software 16.12.2s, Cisco IOS XE Software 16.12.1t, Cisco IOS XE Software 16.12.2t, Cisco IOS XE Software 16.12.4, Cisco IOS XE Software 16.12.3s, Cisco IOS XE Software 16.12.4a, Cisco IOS XE Software 16.12.5, Cisco IOS XE Software 16.12.6, Cisco IOS XE Software 16.12.6a, Cisco IOS XE Software 16.12.7, Cisco IOS XE Software 17.1.1, Cisco IOS XE Software 17.1.1s, Cisco IOS XE Software 17.1.2, Cisco IOS XE Software 17.1.1t, Cisco IOS XE Software 17.1.3, Cisco IOS XE Software 17.2.1, Cisco IOS XE Software 17.2.1a, Cisco IOS XE Software 17.3.1, Cisco IOS XE Software 17.3.2, Cisco IOS XE Software 17.3.3, Cisco IOS XE Software 17.3.2a, Cisco IOS XE Software 17.3.4, Cisco IOS XE Software 17.3.5, Cisco IOS XE Software 17.3.6, Cisco IOS XE Software 17.3.4c, Cisco IOS XE Software 17.3.5a, Cisco IOS XE Software 17.3.5b, Cisco IOS XE Software 17.3.7, Cisco IOS XE Software 17.3.8, Cisco IOS XE Software 17.3.8a, Cisco IOS XE Software 17.4.1, Cisco IOS XE Software 17.5.1, Cisco IOS XE Software 17.5.1b, Cisco IOS XE Software 17.5.1c, Cisco IOS XE Software 17.6.1, Cisco IOS XE Software 17.6.2, Cisco IOS XE Software 17.6.3, Cisco IOS XE Software 17.6.1y, Cisco IOS XE Software 17.6.4, Cisco IOS XE Software 17.6.5, Cisco IOS XE Software 17.6.6, Cisco IOS XE Software 17.6.6a, Cisco IOS XE Software 17.6.5a, Cisco IOS XE Software 17.6.7, Cisco IOS XE Software 17.6.8, Cisco IOS XE Software 17.7.1, Cisco IOS XE Software 17.10.1, Cisco IOS XE Software 17.8.1, Cisco IOS XE Software 17.9.1, Cisco IOS XE Software 17.9.2, Cisco IOS XE Software 17.9.3, Cisco IOS XE Software 17.9.4, Cisco IOS XE Software 17.9.5, Cisco IOS XE Software 17.9.4a, Cisco IOS XE Software 17.11.1, Cisco IOS XE Software 17.12.1, Cisco IOS XE Software 17.12.2, Cisco IOS XE Software 17.12.3, Cisco IOS XE Software 17.12.4, Cisco IOS XE Software 17.13.1, Cisco IOS XE Software 17.14.1, Cisco IOS XE Software 17.11.99SW, Cisco IOS XE Software 17.15.1, Cisco IOS, Cisco IOS XE Software

Related Products

Product CVE Evidence
Cisco IOS CVE-2025-20202 Cisco OpenVuln
Cisco IOS XE Software CVE-2025-20202 Cisco OpenVuln
Cisco Catalyst 9600 Series Switches CVE-2025-20202 Cisco OpenVuln · software-dependent
Cisco Catalyst 9500 Series Switches CVE-2025-20202 Cisco OpenVuln · software-dependent
Cisco Catalyst 9400 Series Switches CVE-2025-20202 Cisco OpenVuln · software-dependent
Cisco Catalyst 9200 Series Switches CVE-2025-20202 Cisco OpenVuln · software-dependent
Cisco Catalyst 9300 Series Switches CVE-2025-20202 Cisco OpenVuln · software-dependent