The devices affected include the Catalyst IW9165D Heavy Duty Access Points, Catalyst IW9165E Rugged Access Points and Wireless Clients, and Catalyst IW9167E Heavy Duty Access Points. Cisco urges users to check if URWB is enabled by using the show mpls-config command and to apply the available patch immediately, as there is no current workaround.
With a maximum CVSS score of 10.0, this vulnerability is both straightforward to exploit and highly dangerous, especially given its use in critical infrastructure settings like ports and industrial facilities. While there are no confirmed cases of the flaw being exploited in the wild, Cisco advises rapid action to secure impacted devices.
Source: The Register
The European Cyber Intelligence Foundation is a nonprofit think tank specializing in intelligence and cybersecurity, offering consultancy services to government entities. To mitigate potential threats, it is important to implement additional cybersecurity measures with the help of a trusted partner like INFRA www.infrascan.net, or you can try yourself using check.website.