These vulnerabilities, disclosed on July 8, 2025, affect wireless network management systems that can scale up to 10,000 access points and 150,000 connected clients, making them particularly concerning for large-scale deployments in schools, hospitals, and smart cities. Network administrators should limit access to trusted users only and ensure these systems operate within isolated management networks. CVE-2025-44958 compounds these risks by storing passwords in a recoverable format using weak encryption with hardcoded keys, potentially exposing all user credentials if the system is compromised. Affects management systems controlling up to 10,000 access points and 150,000 clients in enterprise environments like schools and hospitals. Vendor hasn't released fixes; organizations must immediately isolate affected systems to trusted networks with limited access. Additionally, CVE-2025-44955 exposes a hardcoded password within the jailed environment designed for device configuration, while CVE-2025-6243 reveals hardcoded SSH public keys for the privileged ‘sshuser’ account. The CERT Coordination Center recommends implementing strict network isolation for affected Ruckus wireless management environments. This vulnerability exploits a built-in user account with root privileges, where the default cryptographic keys are identical across all Ruckus deployments. Ruckus vSZ and RND vulnerabilities enable authentication bypass, hardcoded secrets exploitation, and remote code execution leading to full system compromise. JWT keys, API keys, SSH keys, and passwords are embedded in software, allowing easy administrator access without complex attacks.
This Cyber News was published on cybersecuritynews.com. Publication date: Thu, 10 Jul 2025 14:20:30 +0000