#VU116151 Improper Verification of Source of a Communication Channel in Cisco Systems, Inc products - CVE-2025-20365
Published: September 29, 2025
Vulnerability identifier: #VU116151
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2025-20365
CWE-ID: CWE-940
Exploitation vector: Adjecent network
Exploit availability:
No public exploit available
Vulnerable software:
Cisco Access Point Software
6300 Series Embedded Services Access Points
Aironet 4800 Access Points
Catalyst IW6300 Heavy Duty Series Access Points
Cisco Aironet 1540 Series Access Points
Aironet 1560 Series Access Points
Aironet 1800 Series Access Points
Aironet 2800 Series Access Points
Aironet 3800 Series Access Points
Catalyst 9100 Access Points
Integrated APs on1100 Integrated Services Routers (ISRs)
Cisco Access Point Software
6300 Series Embedded Services Access Points
Aironet 4800 Access Points
Catalyst IW6300 Heavy Duty Series Access Points
Cisco Aironet 1540 Series Access Points
Aironet 1560 Series Access Points
Aironet 1800 Series Access Points
Aironet 2800 Series Access Points
Aironet 3800 Series Access Points
Catalyst 9100 Access Points
Integrated APs on1100 Integrated Services Routers (ISRs)
Software vendor:
Cisco Systems, Inc
Cisco Systems, Inc
Description
The vulnerability allows a remote attacker to modify the IPv6 gateway on the target device.
The vulnerability exists due to a logic error in the processing of IPv6 RA packets that are received from wireless clients. A remote attacker on the local network can temporarily change the IPv6 gateway of the device.
Remediation
Install updates from vendor's website.