Sophos patches critical authentication bypass flaw in AP6 Series wireless access points
Take action: If you have Sophos AP6 Series Wireless Access Points, first make sure the management port is isolated from the internet and accessible only from trusted networks. The check that they're running firmware version 1.7.2563 (MR7) or newer. If not, manually upgrade to the latest firmware.
Learn More
Sophos has patched a critical security vulnerability affecting its AP6 Series Wireless Access Points that could allow attackers to gain complete administrative control over affected devices.
The flaw is tracked as CVE-2025-10159 (CVSS score 9.8), and allows affects Sophos AP6 Series Wireless Access Points running firmware versions prior to 1.7.2563 (MR7). Details of the flaw are not disclosed.
The attack requires the adversary to reach the device's management IP address, which in many deployments is restricted to internal networks or dedicated management VLANs. Misconfigured networks with exposed management interfaces could leave devices vulnerable to both internal and external attackers.
Organizations using Sophos's default automatic update policy will receive the security patch without manual intervention. Customers who have disabled automatic updates must manually upgrade their firmware to 1.7.2563 (MR7).