CVE202520364: Unauth Adjacent Attack on Cisco AP 802.11 Action Frame Processing
CVE-2025-20364 Published on September 24, 2025
A vulnerability in the Device Analytics action frame processing of Cisco Wireless Access Point (AP) Software could allow an unauthenticated, adjacent attacker to inject wireless 802.11 action frames with arbitrary information. This vulnerability is due to insufficient verification checks of incoming 802.11 action frames. An attacker could exploit this vulnerability by sending 802.11 Device Analytics action frames with arbitrary parameters. A successful exploit could allow the attacker to inject Device Analytics action frames with arbitrary information, which could modify the Device Analytics data of valid wireless clients that are connected to the same wireless controller.
Vulnerability Analysis
Weakness Type
Origin Validation Error
The software does not properly verify that the source of data or communication is valid.
Products Associated with CVE-2025-20364
Want to know whenever a new CVE is published for Cisco IOS XE? stack.watch will email you.
Affected Versions
Cisco Aironet Access Point Software (IOS XE Controller):- Version 16.10.1e is affected.
- Version 16.10.1 is affected.
- Version 17.1.1t is affected.
- Version 17.1.1s is affected.
- Version 17.1.1 is affected.
- Version 16.11.1a is affected.
- Version 16.11.1 is affected.
- Version 16.11.1c is affected.
- Version 16.11.1b is affected.
- Version 16.12.1s is affected.
- Version 16.12.4 is affected.
- Version 16.12.1 is affected.
- Version 16.12.2s is affected.
- Version 16.12.1t is affected.
- Version 16.12.4a is affected.
- Version 16.12.5 is affected.
- Version 16.12.3 is affected.
- Version 16.12.6 is affected.
- Version 16.12.8 is affected.
- Version 16.12.7 is affected.
- Version 16.12.6a is affected.
- Version 17.3.1 is affected.
- Version 17.3.2a is affected.
- Version 17.3.3 is affected.
- Version 17.3.4 is affected.
- Version 17.3.5 is affected.
- Version 17.3.2 is affected.
- Version 17.3.4c is affected.
- Version 17.3.5a is affected.
- Version 17.3.5b is affected.
- Version 17.3.6 is affected.
- Version 17.3.7 is affected.
- Version 17.3.8 is affected.
- Version 17.3.8a is affected.
- Version 17.2.1 is affected.
- Version 17.2.1a is affected.
- Version 17.2.3 is affected.
- Version 17.2.2 is affected.
- Version 17.5.1 is affected.
- Version 17.4.1 is affected.
- Version 17.6.1 is affected.
- Version 17.6.2 is affected.
- Version 17.6.3 is affected.
- Version 17.6.4 is affected.
- Version 17.6.5 is affected.
- Version 17.6.6 is affected.
- Version 17.6.6a is affected.
- Version 17.6.5a is affected.
- Version 17.6.7 is affected.
- Version 17.6.8 is affected.
- Version 17.10.1 is affected.
- Version 17.9.1 is affected.
- Version 17.9.2 is affected.
- Version 17.9.3 is affected.
- Version 17.9.4 is affected.
- Version 17.9.5 is affected.
- Version 17.9.6 is affected.
- Version 17.7.1 is affected.
- Version 17.8.1 is affected.
- Version 17.11.1 is affected.
- Version 17.12.1 is affected.
- Version 17.12.2 is affected.
- Version 17.12.3 is affected.
- Version 17.12.4 is affected.
- Version 17.12.5 is affected.
- Version 17.13.1 is affected.
- Version 17.14.1 is affected.
- Version 17.15.1 is affected.
- Version 17.15.3 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.