CVE-2025-10159

9.8 CRITICAL

📋 TL;DR

An authentication bypass vulnerability in Sophos AP6 Series Wireless Access Points allows remote attackers to gain administrative privileges without valid credentials. This affects all AP6 devices running firmware older than version 1.7.2563 (MR7). Attackers can completely compromise affected wireless access points.

💻 Affected Systems

Products:
  • Sophos AP6 Series Wireless Access Points
Versions: All firmware versions older than 1.7.2563 (MR7)
Operating Systems: Sophos AP6 firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All AP6 devices with default or custom configurations are vulnerable if running affected firmware versions.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete network compromise: attackers gain administrative control over wireless access points, can intercept/modify traffic, deploy malware, pivot to internal networks, and disable security controls.

🟠

Likely Case

Unauthorized administrative access leading to network eavesdropping, configuration changes, and potential lateral movement to connected systems.

🟢

If Mitigated

Limited impact if devices are isolated in separate VLANs with strict network segmentation and access controls.

🌐 Internet-Facing: HIGH - Wireless access points are typically internet-facing or accessible from guest networks, making them prime targets for remote exploitation.
🏢 Internal Only: HIGH - Even internally, attackers with network access can exploit this to gain administrative privileges on critical infrastructure.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Authentication bypass vulnerabilities typically have low exploitation complexity and are attractive targets for attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.7.2563 (MR7) or later

Vendor Advisory: https://www.sophos.com/en-us/security-advisories/sophos-sa-20250909-ap6

Restart Required: Yes

Instructions:

1. Log into Sophos Central or local management interface. 2. Navigate to device management. 3. Check current firmware version. 4. If below 1.7.2563, download and apply firmware update 1.7.2563 or later. 5. Reboot the access point after update completes.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate AP6 devices in separate VLANs with strict firewall rules limiting management access

Access Control Lists

all

Implement network ACLs to restrict management interface access to authorized IP addresses only

🧯 If You Can't Patch

  • Immediately isolate affected AP6 devices in separate VLANs with no access to critical network segments
  • Implement strict firewall rules allowing management access only from specific trusted IP addresses

🔍 How to Verify

Check if Vulnerable:

Check firmware version via Sophos Central dashboard or local management interface web UI

Check Version:

Login to AP6 web interface and check System > Status > Firmware Version

Verify Fix Applied:

Confirm firmware version shows 1.7.2563 or higher after update

📡 Detection & Monitoring

Log Indicators:

  • Unexpected administrative login events
  • Configuration changes from unknown sources
  • Multiple failed login attempts followed by successful admin access

Network Indicators:

  • Unusual management interface traffic patterns
  • Administrative API calls from unexpected source IPs

SIEM Query:

source="sophos-ap6" AND (event_type="admin_login" OR event_type="config_change") AND user!="authorized_admin"

🔗 References

📤 Share & Export