CVE-2025-20364Origin Validation Error in Cisco Aironet Access Point Software

Severity
4.3MEDIUMNVD
EPSS
0.0%
top 99.08%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 24

Description

A vulnerability in the Device Analytics action frame processing of Cisco Wireless Access Point (AP) Software could allow an unauthenticated, adjacent attacker to inject wireless 802.11 action frames with arbitrary information. This vulnerability is due to insufficient verification checks of incoming 802.11 action frames. An attacker could exploit this vulnerability by sending 802.11 Device Analytics action frames with arbitrary parameters. A successful exploit could allow the attacker to inject

CVSS vector

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:NExploitability: 2.8 | Impact: 1.4

Affected Packages1 packages

🔴Vulnerability Details

2
CVEList
CVE-2025-20364: A vulnerability in the Device Analytics action frame processing of Cisco Wireless Access Point (AP) Software could allow an unauthenticated, adjacent2025-09-24
GHSA
GHSA-fgg9-9q62-gfxm: A vulnerability in the Device Analytics action frame processing of Cisco Wireless Access Point (AP) Software could allow an unauthenticated, adjacent2025-09-24

📋Vendor Advisories

1
Cisco
Cisco Wireless Access Point Software Device Analytics Action Frame Injection Vulnerability2025-09-24
CVE-2025-20364 — Origin Validation Error in Cisco | cvebase