RUCKUS Network Director (RND) before 4.5 allows spoofing of an administrator JWT by an attacker who knows the hardcoded value of a certain secret key.
References
| Link | Resource |
|---|---|
| https://claroty.com/team82/disclosure-dashboard/cve-2025-44963 | Third Party Advisory |
| https://kb.cert.org/vuls/id/613753 | Third Party Advisory |
| https://webresources.commscope.com/download/assets/FAQ+Security+Advisory%3A+ID+20250710/225f44ac3bd311f095821adcaa92e24e | Vendor Advisory |
| https://www.kb.cert.org/vuls/id/613753 |
Configurations
History
03 Nov 2025, 20:19
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Information
Published : 2025-08-04 17:15
Updated : 2025-11-03 20:19
NVD link : CVE-2025-44963
Mitre link : CVE-2025-44963
CVE.ORG link : CVE-2025-44963
JSON object : View
Products Affected
commscope
- ruckus_network_director
CWE
CWE-321
Use of Hard-coded Cryptographic Key
