- "도난 시도만 3억 달러 이상"··· AI 기반 '벤더 이메일 손상 공격'에 주목할 이유
- Cyber as a Pressure Valve: Why Economic Conflict Is Fueling a New Era of Cyber Escalation
- “2025년 스테이블코인 투자 2024년 대비 10배 예상”···CB인사이츠, ‘스테이블코인 시장 지도’ 공개
- The best portable power stations for camping in 2025: Expert tested and reviewed
- "제조 업계, 스마트 기술 전환 중··· 95%가 AI 투자 예정" 로크웰 오토메이션
Cisco Wireless LAN Controllers under threat again after critical exploit details go public

According to the Horizon3 analysis, a hard-coded JSON Web Token (JWT) is at the root of the exploit. “It’s crucial to eliminate hard-coded secrets from authentication workflows, enforce robust file upload validation and path sanitization, and maintain continuous monitoring and patch management across all critical systems,” Barne added.
Diffing allowed locating hard-coded JWT
Tracked as CVE-2025-20188, the flaw disclosed earlier in May was revealed to be an issue affecting the Out-of-Band Access Point (AP) Download feature of Cisco IOS XE Software for WLCs. The AP image download interface uses a hard-coded JWT for authentication, which an attacker can use to authenticate requests without valid credentials.
Horizon3 researchers diffed file system contents from ISO images to arrive at the Lua scripts, where notable changes were found. The scripts referenced both JWT tokens and the associated key, indicating their involvement in the vulnerability. The researchers then performed a simple grep search across the source code to determine how and where these Lua scripts were invoked.