A vulnerability in the Device Analytics action frame processing of Cisco Wireless Access Point (AP) Software could allow an unauthenticated, adjacent attacker to inject wireless 802.11 action frames with arbitrary information.
This vulnerability is due to insufficient verification checks of incoming 802.11 action frames. An attacker could exploit this vulnerability by sending 802.11 Device Analytics action frames with arbitrary parameters. A successful exploit could allow the attacker to inject Device Analytics action frames with arbitrary information, which could modify the Device Analytics data of valid wireless clients that are connected to the same wireless controller.
Metrics
Affected Vendors & Products
References
History
Thu, 25 Sep 2025 08:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Cisco
Cisco aironet Cisco aironet Access Point Cisco aironet Access Point Software Cisco cisco Ios |
|
Vendors & Products |
Cisco
Cisco aironet Cisco aironet Access Point Cisco aironet Access Point Software Cisco cisco Ios |
Wed, 24 Sep 2025 17:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability in the Device Analytics action frame processing of Cisco Wireless Access Point (AP) Software could allow an unauthenticated, adjacent attacker to inject wireless 802.11 action frames with arbitrary information. This vulnerability is due to insufficient verification checks of incoming 802.11 action frames. An attacker could exploit this vulnerability by sending 802.11 Device Analytics action frames with arbitrary parameters. A successful exploit could allow the attacker to inject Device Analytics action frames with arbitrary information, which could modify the Device Analytics data of valid wireless clients that are connected to the same wireless controller. | A vulnerability in the Device Analytics action frame processing of Cisco Wireless Access Point (AP) Software could allow an unauthenticated, adjacent attacker to inject wireless 802.11 action frames with arbitrary information. This vulnerability is due to insufficient verification checks of incoming 802.11 action frames. An attacker could exploit this vulnerability by sending 802.11 Device Analytics action frames with arbitrary parameters. A successful exploit could allow the attacker to inject Device Analytics action frames with arbitrary information, which could modify the Device Analytics data of valid wireless clients that are connected to the same wireless controller. |
Title | Cisco Wireless Access Point Software Device Analytics Action Frame Injection Vulnerability |
Wed, 24 Sep 2025 17:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability in the Device Analytics action frame processing of Cisco Wireless Access Point (AP) Software could allow an unauthenticated, adjacent attacker to inject wireless 802.11 action frames with arbitrary information. This vulnerability is due to insufficient verification checks of incoming 802.11 action frames. An attacker could exploit this vulnerability by sending 802.11 Device Analytics action frames with arbitrary parameters. A successful exploit could allow the attacker to inject Device Analytics action frames with arbitrary information, which could modify the Device Analytics data of valid wireless clients that are connected to the same wireless controller. | |
Title | Cisco Wireless Access Point Software Device Analytics Action Frame Injection Vulnerability | |
Weaknesses | CWE-346 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: cisco
Published: 2025-09-24T16:40:16.242Z
Updated: 2025-09-24T17:17:11.787Z
Reserved: 2024-10-10T19:15:13.258Z
Link: CVE-2025-20364

No data.

Status : Awaiting Analysis
Published: 2025-09-24T17:15:40.703
Modified: 2025-09-24T18:15:37.200
Link: CVE-2025-20364

No data.