RUCKUS Network Director (RND) before 4.5 allows jailed users to obtain root access vis a weak, hardcoded password.
References
| Link | Resource |
|---|---|
| https://claroty.com/team82/disclosure-dashboard/cve-2025-44955 | Third Party Advisory |
| https://kb.cert.org/vuls/id/613753 | Third Party Advisory |
| https://webresources.commscope.com/download/assets/FAQ+Security+Advisory%3A+ID+20250710/225f44ac3bd311f095821adcaa92e24e | Vendor Advisory |
| https://www.kb.cert.org/vuls/id/613753 |
Configurations
History
03 Nov 2025, 20:19
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Information
Published : 2025-08-04 16:15
Updated : 2025-11-03 20:19
NVD link : CVE-2025-44955
Mitre link : CVE-2025-44955
CVE.ORG link : CVE-2025-44955
JSON object : View
Products Affected
commscope
- ruckus_network_director
CWE
CWE-259
Use of Hard-coded Password
