CVE-2025-10159
📋 TL;DR
An authentication bypass vulnerability in Sophos AP6 Series Wireless Access Points allows remote attackers to gain administrative privileges without valid credentials. This affects all AP6 devices running firmware older than version 1.7.2563 (MR7). Attackers can completely compromise affected wireless access points.
💻 Affected Systems
- Sophos AP6 Series Wireless Access Points
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Complete network compromise: attackers gain administrative control over wireless access points, can intercept/modify traffic, deploy malware, pivot to internal networks, and disable security controls.
Likely Case
Unauthorized administrative access leading to network eavesdropping, configuration changes, and potential lateral movement to connected systems.
If Mitigated
Limited impact if devices are isolated in separate VLANs with strict network segmentation and access controls.
🎯 Exploit Status
Authentication bypass vulnerabilities typically have low exploitation complexity and are attractive targets for attackers.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.7.2563 (MR7) or later
Vendor Advisory: https://www.sophos.com/en-us/security-advisories/sophos-sa-20250909-ap6
Restart Required: Yes
Instructions:
1. Log into Sophos Central or local management interface. 2. Navigate to device management. 3. Check current firmware version. 4. If below 1.7.2563, download and apply firmware update 1.7.2563 or later. 5. Reboot the access point after update completes.
🔧 Temporary Workarounds
Network Segmentation
allIsolate AP6 devices in separate VLANs with strict firewall rules limiting management access
Access Control Lists
allImplement network ACLs to restrict management interface access to authorized IP addresses only
🧯 If You Can't Patch
- Immediately isolate affected AP6 devices in separate VLANs with no access to critical network segments
- Implement strict firewall rules allowing management access only from specific trusted IP addresses
🔍 How to Verify
Check if Vulnerable:
Check firmware version via Sophos Central dashboard or local management interface web UI
Check Version:
Login to AP6 web interface and check System > Status > Firmware Version
Verify Fix Applied:
Confirm firmware version shows 1.7.2563 or higher after update
📡 Detection & Monitoring
Log Indicators:
- Unexpected administrative login events
- Configuration changes from unknown sources
- Multiple failed login attempts followed by successful admin access
Network Indicators:
- Unusual management interface traffic patterns
- Administrative API calls from unexpected source IPs
SIEM Query:
source="sophos-ap6" AND (event_type="admin_login" OR event_type="config_change") AND user!="authorized_admin"