CVE-2025-44963
RND后端服务器使用硬编码密钥验证JWT会话,存在安全漏洞。攻击者若获取密钥可伪造JWT并以管理员权限访问服务器。厂商尚未提供补丁,建议限制无线管理环境访问并采用HTTPS或SSH等安全协议管理设备。 2025-7-8 09:37:0 Author: claroty.com(查看原文) 阅读量:2 收藏

Critical Threat

CWE-321: Use of Hard-coded Cryptographic Key

RND uses a secret key on the backend web server to ensure that session JWTs are valid. This secret key is hardcoded into the web server. Anyone with knowledge of the secret key could create a valid JWT, thus bypassing the typical authentication to access the server with administrator privileges.

No patches have been supplied by the vendor at this time. To mitigate risk, network administrators should limit access to the wireless management environments that use these affected products, allowing a limited set of trusted users and their authenticated clients to manage Ruckus infrastructure via a secure protocol such as HTTPS or SSH.


文章来源: https://claroty.com/team82/disclosure-dashboard/cve-2025-44963
如有侵权请联系:admin#unsafe.sh