Логотип exploitDog
bind:CVE-2025-20293
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-20293

Количество 3

Количество 3

nvd логотип

CVE-2025-20293

5 месяцев назад

A vulnerability in the Day One setup process of Cisco IOS XE Software for Catalyst 9800 Series Wireless Controllers for Cloud (9800-CL) could allow an unauthenticated, remote attacker to access the public-key infrastructure (PKI) server that is running on an affected device. This vulnerability is due to incomplete cleanup upon completion of the Day One setup process. An attacker could exploit this vulnerability by sending Simple Certificate Enrollment Protocol (SCEP) requests to an affected device. A successful exploit could allow the attacker to request a certificate from the virtual wireless controller and then use the acquired certificate to join an attacker-controlled device to the virtual wireless controller.

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-vjm2-5vch-882g

5 месяцев назад

A vulnerability in the Day One setup process of Cisco IOS XE Software for Catalyst 9800 Series Wireless Controllers for Cloud (9800-CL) could allow an unauthenticated, remote attacker to access the public-key infrastructure (PKI) server that is running on an affected device. This vulnerability is due to incomplete cleanup upon completion of the Day One setup process. An attacker could exploit this vulnerability by sending Simple Certificate Enrollment Protocol (SCEP) requests to an affected device. A successful exploit could allow the attacker to request a certificate from the virtual wireless controller and then use the acquired certificate to join an attacker-controlled device to the virtual wireless controller.

CVSS3: 5.3
EPSS: Низкий
fstec логотип

BDU:2025-11712

5 месяцев назад

Уязвимость операционных систем Cisco IOS XE сетевого устройства Catalyst 9800, связанная с неполной очисткой временных или вспомогательных ресурсов, позволяющая нарушителю получить доступ к контроллеру

CVSS3: 5.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-20293

A vulnerability in the Day One setup process of Cisco IOS XE Software for Catalyst 9800 Series Wireless Controllers for Cloud (9800-CL) could allow an unauthenticated, remote attacker to access the public-key infrastructure (PKI) server that is running on an affected device. This vulnerability is due to incomplete cleanup upon completion of the Day One setup process. An attacker could exploit this vulnerability by sending Simple Certificate Enrollment Protocol (SCEP) requests to an affected device. A successful exploit could allow the attacker to request a certificate from the virtual wireless controller and then use the acquired certificate to join an attacker-controlled device to the virtual wireless controller.

CVSS3: 5.3
0%
Низкий
5 месяцев назад
github логотип
GHSA-vjm2-5vch-882g

A vulnerability in the Day One setup process of Cisco IOS XE Software for Catalyst 9800 Series Wireless Controllers for Cloud (9800-CL) could allow an unauthenticated, remote attacker to access the public-key infrastructure (PKI) server that is running on an affected device. This vulnerability is due to incomplete cleanup upon completion of the Day One setup process. An attacker could exploit this vulnerability by sending Simple Certificate Enrollment Protocol (SCEP) requests to an affected device. A successful exploit could allow the attacker to request a certificate from the virtual wireless controller and then use the acquired certificate to join an attacker-controlled device to the virtual wireless controller.

CVSS3: 5.3
0%
Низкий
5 месяцев назад
fstec логотип
BDU:2025-11712

Уязвимость операционных систем Cisco IOS XE сетевого устройства Catalyst 9800, связанная с неполной очисткой временных или вспомогательных ресурсов, позволяющая нарушителю получить доступ к контроллеру

CVSS3: 5.3
0%
Низкий
5 месяцев назад

Уязвимостей на страницу