RUCKUS SmartZone (SZ) before 6.1.2p3 Refresh Build has a hardcoded SSH private key for a root-equivalent user account.
References
| Link | Resource |
|---|---|
| https://claroty.com/team82/disclosure-dashboard/cve-2025-44954 | Third Party Advisory |
| https://kb.cert.org/vuls/id/613753 | Third Party Advisory US Government Resource |
| https://webresources.commscope.com/download/assets/FAQ+Security+Advisory%3A+ID+20250710/225f44ac3bd311f095821adcaa92e24e | Vendor Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2025-08-04 17:15
Updated : 2025-08-07 17:55
NVD link : CVE-2025-44954
Mitre link : CVE-2025-44954
CVE.ORG link : CVE-2025-44954
JSON object : View
Products Affected
commscope
- ruckus_h320
- ruckus_r610
- ruckus_t310n
- ruckus_t750
- ruckus_virtual_smartzone-federal
- ruckus_r710
- ruckus_smartzone_100
- ruckus_r510
- ruckus_h510
- ruckus_smartzone_144-federal
- ruckus_r730
- ruckus_smartzone_300
- ruckus_t310d
- ruckus_t350se
- ruckus_t310c
- ruckus_smartzone_144
- ruckus_r720
- ruckus_h350
- ruckus_virtual_smartzone
- ruckus_m510
- ruckus_e510
- ruckus_r750
- ruckus_smartzone_300-federal
- ruckus_smartzone_firmware
- ruckus_smartzone_100-d
- ruckus_r560
- ruckus_t310s
- ruckus_t750se
- ruckus_r320
- ruckus_c110
CWE
CWE-1394
Use of Default Cryptographic Key
