CVE-2025-10159
BaseFortify
Publication date: 2025-09-09
Last updated on: 2025-09-11
Assigner: Sophos Limited
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| sophos | ap6_series_wireless_access_point | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-620 | When setting a new password for a user, the product does not require knowledge of the original password, or using another form of authentication. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an authentication bypass in Sophos AP6 Series Wireless Access Points with firmware versions older than 1.7.2563 (MR7). It allows remote attackers to gain administrative privileges without proper authentication.
How can this vulnerability impact me? :
An attacker exploiting this vulnerability can gain full administrative access to the affected wireless access points remotely. This can lead to unauthorized control over the device, potentially allowing the attacker to manipulate network settings, intercept or disrupt network traffic, and compromise network security.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, immediately upgrade the firmware of Sophos AP6 Series Wireless Access Points to version 1.7.2563 (MR7) or later.