
Redazione RHC : 11 September 2025 14:32
Sophos has announced that it has fixed a critical authentication bypass vulnerability affecting its AP6 series wireless access points. The flaw allowed a remote attacker to gain administrative privileges by accessing the device’s management IP address. The discovery was made during internal security testing conducted by the company.
The issue affects firmware versions prior to 1.7.2563 (MR7). In these releases, the vulnerability exposed access points to the risk of complete compromise, allowing an attacker to control configurations and functionality.
Sophos has rated the vulnerability’s severity as critical, with a CVSS score of 9.8. The technical description traces it to a flaw classified as CWE-620, which states “When setting a new password for a user, the product does not require knowledge of the original password or use of any other form of authentication.”
Customers using the default update policy do not need to take any action, as patches are installed automatically. This ensures immediate protection from the flaw without manual intervention by network administrators.
The situation is different for those who have chosen to disable automatic updates: in this case, it is essential to manually install firmware version 1.7.2563 (MR7), released after August 11, 2025, to receive the latest fix and protections.
Sophos encourages all users running older firmware to update as soon as possible. The company emphasizes that only the latest version of the AP6 series access points is fully secured against this vulnerability.
Further technical information and official details are available in Sophos’ published references, including CVE-2025-10159 and the community announcement for wireless product updates.
Redazione