CVE-2025-44955
RND设备存在硬编码弱密码漏洞,允许攻击者通过内置越狱功能获取root权限。由于厂商未提供补丁,建议限制无线管理环境访问并使用HTTPS或SSH等安全协议进行管理。 2025-7-8 09:39:0 Author: claroty.com(查看原文) 阅读量:2 收藏

High Threat

CWE-259: Use of Hard-coded Password

RND includes a jailed environment to allow users to configure devices without complete shell access to the underlying operating system. The jailed environment includes a built-in jailbreak for technicians to elevate privileges. The jailbreak requires a weak password that is hardcoded into the environment. Anyone with this password can access an RND server with root permissions.

No patches have been supplied by the vendor at this time. To mitigate risk, network administrators should limit access to the wireless management environments that use these affected products, allowing a limited set of trusted users and their authenticated clients to manage Ruckus infrastructure via a secure protocol such as HTTPS or SSH.


文章来源: https://claroty.com/team82/disclosure-dashboard/cve-2025-44955
如有侵权请联系:admin#unsafe.sh