CVE-2025-44957
vSZ应用中存在多个硬编码密钥,易被访问并绕过认证,赋予攻击者管理员权限。厂商尚未提供补丁,建议限制无线管理环境访问,仅允许受信任用户通过HTTPS或SSH管理设备。 2025-7-8 09:30:0 Author: claroty.com(查看原文) 阅读量:2 收藏

Critical Threat

Multiple secrets are hardcoded into the vSZ application, making them vulnerable to access thus allowing elevated privileges. Using HTTP headers and a valid API key, it is possible to logically bypass the authentication methods, providing administrator-level access to anyone that does this.

No patches have been supplied by the vendor at this time. To mitigate risk, network administrators should limit access to the wireless management environments that use these affected products, allowing a limited set of trusted users and their authenticated clients to manage Ruckus infrastructure via a secure protocol such as HTTPS or SSH.


文章来源: https://claroty.com/team82/disclosure-dashboard/cve-2025-44957
如有侵权请联系:admin#unsafe.sh