Tuesday, August 5, 2025

Critical Ruckus Wireless Vulnerabilities Exposes Enterprise Wireless Networks

Share

Multiple critical vulnerabilities have been discovered in Ruckus Wireless management products, specifically Virtual SmartZone (vSZ) and Network Director (RND), potentially allowing complete compromise of enterprise wireless environments. 

These vulnerabilities, disclosed on July 8, 2025, affect wireless network management systems that can scale up to 10,000 access points and 150,000 connected clients, making them particularly concerning for large-scale deployments in schools, hospitals, and smart cities.

Key Takeaways
1. Ruckus vSZ and RND vulnerabilities enable authentication bypass, hardcoded secrets exploitation, and remote code execution leading to full system compromise.
2. JWT keys, API keys, SSH keys, and passwords are embedded in software, allowing easy administrator access without complex attacks.
3. Affects management systems controlling up to 10,000 access points and 150,000 clients in enterprise environments like schools and hospitals.
4. Vendor hasn't released fixes; organizations must immediately isolate affected systems to trusted networks with limited access.

Authentication Bypass and Hardcoded Secrets 

The most severe vulnerabilities stem from hardcoded cryptographic secrets embedded within the software architecture. 


Google News

CVE-2025-44957 exposes hardcoded JWT signing keys and API keys that enable complete authentication bypass, allowing attackers to gain administrator-level access using HTTP headers and valid API keys. 

Similarly, CVE-2025-44954 represents an unauthenticated remote code execution vulnerability caused by hardcoded default RSA public and private keys in the SSH configuration. 

This vulnerability exploits a built-in user account with root privileges, where the default cryptographic keys are identical across all Ruckus deployments.

Network Director faces comparable issues with CVE-2025-44963, which involves hardcoded JWT secret keys that attackers can exploit to create valid authentication tokens. 

Additionally, CVE-2025-44955 exposes a hardcoded password within the jailed environment designed for device configuration, while CVE-2025-6243 reveals hardcoded SSH public keys for the privileged ‘sshuser’ account.

Remote Code Execution and File Traversal Attacks 

CVE-2025-44960 demonstrates OS command injection through unsanitized user-controlled parameters in vSZ API routes, enabling attackers to execute arbitrary commands. 

CVE-2025-44961 presents another RCE vulnerability where IP address parameters lack proper sanitization, allowing command injection attacks.

CVE-2025-44962 introduces directory traversal capabilities through relative path manipulation, enabling authenticated users to read sensitive files outside designated directories using “../” sequences. 

CVE-2025-44958 compounds these risks by storing passwords in a recoverable format using weak encryption with hardcoded keys, potentially exposing all user credentials if the system is compromised.

CVE Description Severity
CVE-2025-44957 Hardcoded Secrets – Authentication bypass  Critical
CVE-2025-44954 Unauthenticated RCE – Built-in user with root privileges accessible Critical
CVE-2025-44960 Remote Code Execution – Unsanitized user-controlled parameters in vSZ API routes Critical
CVE-2025-44961 Remote Code Execution- Unsanitized IP address parameters in OS commands Critical
CVE-2025-44963 Hardcoded JWT secret key in RND backend – Hardcoded secret enables JWT token creation Critical
CVE-2025-44955 Hardcoded jailbreak password in RND – Weak hardcoded password for privilege escalation High
CVE-2025-6243 Hardcoded SSH public key for ‘sshuser’ – Default SSH keys for privileged user account High
CVE-2025-44962 Authenticated arbitrary file read – Directory traversal  Medium
CVE-2025-44958 Recoverable password storage – Weak encryption with hardcoded keys Medium

Mitigation Strategies

Currently, no vendor patches are available for these vulnerabilities. The CERT Coordination Center recommends implementing strict network isolation for affected Ruckus wireless management environments. 

Network administrators should limit access to trusted users only and ensure these systems operate within isolated management networks. Secure protocols such as HTTPS and SSH should be enforced for all management communications.

These vulnerabilities can be chained together to create sophisticated attack vectors that bypass individual security controls, potentially leading to complete wireless infrastructure compromise. 

Organizations using Ruckus Virtual SmartZone or Network Director should immediately assess their network segmentation and access controls while awaiting vendor remediation.

Investigate live malware behavior, trace every step of an attack, and make faster, smarter security decisions -> Try ANY.RUN now 

Tarun Chhetri
Tarun Chhetri
We love Tech, AI, Cybersecurity, Startups, Business, Skills, Sports.

Read more

Local News

Follow Us