CVE-2025-44957

Ruckus SmartZone (SZ) before 6.1.2p3 Refresh Build allows authentication bypass via a valid API key and crafted HTTP headers.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:o:commscope:ruckus_smartzone_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:commscope:ruckus_smartzone_firmware:6.1.2:-:*:*:*:*:*:*
cpe:2.3:o:commscope:ruckus_smartzone_firmware:6.1.2:p2:*:*:*:*:*:*
cpe:2.3:o:commscope:ruckus_smartzone_firmware:6.1.2:p3:*:*:*:*:*:*
cpe:2.3:o:commscope:ruckus_smartzone_firmware:7.0.0:*:*:*:*:*:*:*
cpe:2.3:o:commscope:ruckus_smartzone_firmware:7.1.0:*:*:*:*:*:*:*
OR cpe:2.3:a:commscope:ruckus_virtual_smartzone:-:*:*:*:*:*:*:*
cpe:2.3:a:commscope:ruckus_virtual_smartzone-federal:-:*:*:*:*:*:*:*
cpe:2.3:h:commscope:ruckus_c110:-:*:*:*:*:*:*:*
cpe:2.3:h:commscope:ruckus_e510:-:*:*:*:*:*:*:*
cpe:2.3:h:commscope:ruckus_h320:-:*:*:*:*:*:*:*
cpe:2.3:h:commscope:ruckus_h350:-:*:*:*:*:*:*:*
cpe:2.3:h:commscope:ruckus_h510:-:*:*:*:*:*:*:*
cpe:2.3:h:commscope:ruckus_m510:-:*:*:*:*:*:*:*
cpe:2.3:h:commscope:ruckus_r320:-:*:*:*:*:*:*:*
cpe:2.3:h:commscope:ruckus_r510:-:*:*:*:*:*:*:*
cpe:2.3:h:commscope:ruckus_r560:-:*:*:*:*:*:*:*
cpe:2.3:h:commscope:ruckus_r610:-:*:*:*:*:*:*:*
cpe:2.3:h:commscope:ruckus_r710:-:*:*:*:*:*:*:*
cpe:2.3:h:commscope:ruckus_r720:-:*:*:*:*:*:*:*
cpe:2.3:h:commscope:ruckus_r730:-:*:*:*:*:*:*:*
cpe:2.3:h:commscope:ruckus_r750:-:*:*:*:*:*:*:*
cpe:2.3:h:commscope:ruckus_smartzone_100:-:*:*:*:*:*:*:*
cpe:2.3:h:commscope:ruckus_smartzone_100-d:-:*:*:*:*:*:*:*
cpe:2.3:h:commscope:ruckus_smartzone_144:-:*:*:*:*:*:*:*
cpe:2.3:h:commscope:ruckus_smartzone_144-federal:-:*:*:*:*:*:*:*
cpe:2.3:h:commscope:ruckus_smartzone_300:-:*:*:*:*:*:*:*
cpe:2.3:h:commscope:ruckus_smartzone_300-federal:-:*:*:*:*:*:*:*
cpe:2.3:h:commscope:ruckus_t310c:-:*:*:*:*:*:*:*
cpe:2.3:h:commscope:ruckus_t310d:-:*:*:*:*:*:*:*
cpe:2.3:h:commscope:ruckus_t310n:-:*:*:*:*:*:*:*
cpe:2.3:h:commscope:ruckus_t310s:-:*:*:*:*:*:*:*
cpe:2.3:h:commscope:ruckus_t350se:-:*:*:*:*:*:*:*
cpe:2.3:h:commscope:ruckus_t750:-:*:*:*:*:*:*:*
cpe:2.3:h:commscope:ruckus_t750se:-:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:commscope:ruckus_network_director:*:*:*:*:*:*:*:*

History

03 Nov 2025, 20:19

Type Values Removed Values Added
References
  • () https://www.kb.cert.org/vuls/id/613753 -

Information

Published : 2025-08-04 17:15

Updated : 2025-11-03 20:19


NVD link : CVE-2025-44957

Mitre link : CVE-2025-44957

CVE.ORG link : CVE-2025-44957


JSON object : View

Products Affected

commscope

  • ruckus_h320
  • ruckus_r610
  • ruckus_t310n
  • ruckus_t750
  • ruckus_virtual_smartzone-federal
  • ruckus_r710
  • ruckus_smartzone_100
  • ruckus_r510
  • ruckus_h510
  • ruckus_smartzone_144-federal
  • ruckus_network_director
  • ruckus_r730
  • ruckus_smartzone_300
  • ruckus_t310d
  • ruckus_t350se
  • ruckus_t310c
  • ruckus_smartzone_144
  • ruckus_r720
  • ruckus_h350
  • ruckus_virtual_smartzone
  • ruckus_m510
  • ruckus_e510
  • ruckus_r750
  • ruckus_smartzone_300-federal
  • ruckus_smartzone_firmware
  • ruckus_smartzone_100-d
  • ruckus_r560
  • ruckus_t310s
  • ruckus_t750se
  • ruckus_r320
  • ruckus_c110
CWE
CWE-288

Authentication Bypass Using an Alternate Path or Channel