February 16, 2025

Cisco is warning of a bug present in its Unified industrial Wi-fi Software program for Cisco Extremely-Dependable Wi-fi Backhaul (URWB) entry factors that would permit an unauthenticated distant attacker to launch command injection assaults.

An attacker might exploit the vulnerability by sending HTTP requests to the Net-based administration interface of an affected system. If profitable, the attacker might execute arbitrary instructions with root privileges within the affected machine’s underlying working system.

The vulnerability exists resulting from an improper validation of enter to the Net-based administration interface. It impacts the three Cisco wi-fi entry factors (APs) if they’ve the URWB working mode enabled and are working a weak launch: Catalyst IW9165D, Catalyst IW9165E (each APs and shoppers), and Catalyst IW9167E.

Units not working URWB working mode stay unaffected by this vulnerability. To establish whether or not URWB is enabled, customers ought to use the “present mpls-config” CLI command.

“If the command is obtainable, the URWB working mode is enabled and the machine is affected by this vulnerability,” Cisco said. “If the command isn’t out there, the URWB working mode is disabled and the machine isn’t affected by this vulnerability.”

Cisco mentioned it is unaware of any public exploitation of the vulnerability and has launched a repair for the flaw, however there aren’t any different workarounds to deal with it.