CVE-2025-20293

5.3 MEDIUM

📋 TL;DR

A vulnerability in Cisco IOS XE Software for Catalyst 9800-CL wireless controllers allows unauthenticated remote attackers to access the PKI server after Day One setup. This enables attackers to request certificates and join malicious devices to the virtual wireless controller. Only Catalyst 9800-CL controllers with Day One setup completed are affected.

💻 Affected Systems

Products:
  • Cisco Catalyst 9800 Series Wireless Controllers for Cloud (9800-CL)
Versions: Cisco IOS XE Software releases 17.14.1 and earlier
Operating Systems: Cisco IOS XE
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects devices where Day One setup has been completed. The vulnerability exists because the SCEP server remains accessible after setup completion.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker gains unauthorized access to wireless network infrastructure, joins rogue devices, intercepts traffic, or launches man-in-the-middle attacks against legitimate wireless clients.

🟠

Likely Case

Unauthorized device joins the wireless controller network, potentially enabling network reconnaissance, data interception, or lateral movement within the network.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to the wireless controller management plane without compromising core network infrastructure.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending SCEP requests to the vulnerable device. No authentication is required, making exploitation straightforward for attackers who can reach the device.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Cisco IOS XE Software release 17.14.1a or later

Vendor Advisory: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-9800cl-openscep-SB4xtxzP

Restart Required: No

Instructions:

1. Download the fixed software from Cisco Software Center. 2. Upgrade to Cisco IOS XE Software release 17.14.1a or later. 3. No reload or restart is required after installation.

🔧 Temporary Workarounds

Disable SCEP Server

all

Manually disable the SCEP server that remains active after Day One setup completion

configure terminal
no crypto pki server scep
end
write memory

🧯 If You Can't Patch

  • Implement strict network access controls to limit SCEP traffic to trusted sources only
  • Monitor for unauthorized certificate enrollment requests and unexpected device joins to the wireless controller

🔍 How to Verify

Check if Vulnerable:

Check if device is running Cisco IOS XE Software release 17.14.1 or earlier and has completed Day One setup

Check Version:

show version | include Version

Verify Fix Applied:

Verify the device is running Cisco IOS XE Software release 17.14.1a or later, or confirm the SCEP server is disabled

📡 Detection & Monitoring

Log Indicators:

  • Unexpected SCEP enrollment requests
  • Unauthorized certificate issuance logs
  • Unknown devices joining the wireless controller

Network Indicators:

  • SCEP traffic from untrusted sources to the wireless controller
  • Unexpected certificate enrollment protocol traffic

SIEM Query:

source_ip NOT IN trusted_networks AND dest_port=80 AND protocol=HTTP AND uri CONTAINS 'cgi-bin/pkiclient.exe'

🔗 References

📤 Share & Export