CVE-2025-57601

9.8 CRITICAL

📋 TL;DR

This vulnerability allows attackers who obtain the hardcoded SSH private key to impersonate any managed IoT/edge device in AiKaan Cloud Controller environments. They can establish unauthorized reverse SSH tunnels and gain full access to devices without owner consent. All customers using the affected AiKaan Cloud Controller are impacted.

💻 Affected Systems

Products:
  • AiKaan Cloud Controller
Versions: All versions prior to patch
Operating Systems: Linux-based systems running AiKaan Cloud Controller
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments using the 'Open Remote Terminal' feature are vulnerable. The vulnerability exists in the authentication design, not a specific configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of all managed IoT/edge devices across all customer environments, enabling data theft, device manipulation, lateral movement, and potential physical consequences depending on device functions.

🟠

Likely Case

Targeted attackers compromising specific devices for data exfiltration, ransomware deployment, or establishing persistent access in customer networks.

🟢

If Mitigated

Limited to devices where network segmentation prevents access to the remote access server or where additional authentication layers exist.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires obtaining the hardcoded SSH key, which could be achieved through network interception, server compromise, or admin account compromise. Once obtained, exploitation is trivial.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: No

Instructions:

No official patch available. Contact AiKaan vendor for security updates. This requires architectural changes to implement per-device authentication.

🔧 Temporary Workarounds

Disable Remote Terminal Feature

all

Completely disable the 'Open Remote Terminal' functionality in AiKaan Cloud Controller to prevent exploitation.

# Configuration change required in AiKaan dashboard settings
# Consult AiKaan documentation for disabling remote terminal access

Network Segmentation

linux

Isolate the remote access server and controller from untrusted networks to limit attack surface.

# Implement firewall rules to restrict access to SSH ports
# Example: iptables -A INPUT -p tcp --dport 22 -s trusted_networks -j ACCEPT
# iptables -A INPUT -p tcp --dport 22 -j DROP

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate the remote access server and controller
  • Monitor for unauthorized SSH connections and reverse tunnel establishment
  • Consider alternative remote access solutions with proper authentication

🔍 How to Verify

Check if Vulnerable:

Check if AiKaan Cloud Controller uses the same SSH key for all devices by examining configuration files or network traffic during remote terminal sessions.

Check Version:

# Check AiKaan version via dashboard or configuration files

Verify Fix Applied:

Verify that each device now uses unique SSH keys or that the remote terminal feature has been properly disabled.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized SSH connections from unexpected IPs
  • Multiple devices establishing SSH connections with same key fingerprint
  • Failed authentication attempts for proxyuser account

Network Indicators:

  • SSH traffic to/from the remote access server from unexpected sources
  • Reverse SSH tunnel establishment patterns

SIEM Query:

source="ssh.log" (user="proxyuser" AND NOT src_ip in [allowed_ips]) OR (ssh_key_fingerprint="[hardcoded_key_fingerprint]" AND count() > threshold)

🔗 References

📤 Share & Export