CVE-2025-44954
CWE-1394漏洞导致Ruckus vSZ设备因默认SSH密钥存在未认证远程代码执行风险。内置用户具有root权限且私钥公开,允许攻击者轻松获取高权限。厂商尚未修复此问题,建议限制访问并使用安全协议管理设备. 2025-7-8 09:33:0 Author: claroty.com(查看原文) 阅读量:1 收藏

Critical Threat

CWE-1394: Use of Default Cryptographic Key

Unauthenticated RCE in SSH due to Hardcoded Default Public/Private Keys . Ruckus vSZ has a built-in user with all of the same privileges as root. This user also has default public and private RSA keys in its /home/$USER/.ssh/ directory. Anyone with a Ruckus device would also have this private key and be able to ssh as this and then have root-level permissions.

No patches have been supplied by the vendor at this time. To mitigate risk, network administrators should limit access to the wireless management environments that use these affected products, allowing a limited set of trusted users and their authenticated clients to manage Ruckus infrastructure via a secure protocol such as HTTPS or SSH.


文章来源: https://claroty.com/team82/disclosure-dashboard/cve-2025-44954
如有侵权请联系:admin#unsafe.sh