The CERT Coordination Center has disclosed nine critical security vulnerabilities in Ruckus Wireless network management products that could allow attackers to completely compromise enterprise wireless environments.
The vulnerabilities, affecting Virtual SmartZone (vSZ) and Network Director (RND) software, include authentication bypass mechanisms, hardcoded cryptographic keys, and unauthenticated remote code execution capabilities that pose severe risks to organizations using these widely-deployed network management solutions.
Multiple Critical Flaws
The disclosed vulnerabilities represent a comprehensive security breakdown in Ruckus Wireless products used by schools, hospitals, multi-tenant residences, and smart cities for managing large-scale wireless networks.
Virtual SmartZone, capable of managing up to 10,000 access points and 150,000 connected clients, contains several critical flaws that enable complete system compromise.
Among the most severe vulnerabilities is CVE-2025-44954, which involves unauthenticated remote code execution through hardcoded default SSH keys.
This flaw allows any attacker with access to a Ruckus device to obtain the private key and gain root-level access to vSZ systems.
Additionally, CVE-2025-44957 exposes hardcoded secrets, including JWT signing keys and API keys, enabling authentication bypass and administrator-level access without proper credentials.
The vulnerabilities extend to command injection flaws, with CVE-2025-44960 and CVE-2025-44961 allowing authenticated users to execute arbitrary operating system commands through unsanitized input parameters.
CVE-2025-44962 enables arbitrary file reading through directory traversal attacks, potentially exposing sensitive configuration files and credentials.
Network Director faces similar security issues, including CVE-2025-44963, which involves hardcoded JWT tokens for session validation, and CVE-2025-44955, featuring a weak hardcoded password for privilege escalation.
The platform also stores passwords in recoverable formats using weak encryption keys, as detailed in CVE-2025-44958.
Security Researchers Urge Immediate Mitigation
The vulnerabilities were discovered by Noam Moshe of Claroty Team82, highlighting the extensive security research conducted on these enterprise networking products.
However, the CERT Coordination Center reports they have been unable to reach Ruckus Wireless or their parent company, CommScope, for an official response to the disclosed vulnerabilities.
With no patches currently available from the vendor, CERT recommends implementing immediate mitigation strategies.
Network administrators should isolate wireless management environments using these affected products and restrict access to trusted users only.
The recommendation emphasizes using secure protocols like HTTPS or SSH and limiting network access to prevent exploitation of these critical vulnerabilities.
The disclosure underscores the importance of vendor responsibility in addressing security flaws promptly, particularly for products managing critical network infrastructure.
Organizations using Ruckus Wireless products should implement the recommended mitigations immediately while awaiting vendor patches for these serious security vulnerabilities.
Find this Story Interesting! Follow us on Google News, LinkedIn, and X to Get More Instant updates