CVE-2025-67305

9.8 CRITICAL

📋 TL;DR

RUCKUS Network Director (RND) OVA appliances contain identical hardcoded SSH keys for the postgres user across all deployments, allowing attackers with network access to authenticate without passwords. This enables database access with superuser privileges, creation of administrative web users, and potential privilege escalation. All deployments running RND versions below 4.5.0.56 are affected.

💻 Affected Systems

Products:
  • RUCKUS Network Director (RND)
Versions: All versions < 4.5.0.56
Operating Systems: OVA appliance deployment
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects OVA appliance deployments; physical appliance deployments are not affected.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise including remote code execution, database manipulation, creation of persistent backdoors, and lateral movement to other systems.

🟠

Likely Case

Unauthorized database access leading to data theft, creation of administrative web users, and potential privilege escalation within the RUCKUS environment.

🟢

If Mitigated

Limited impact if SSH access is blocked at network boundaries and proper segmentation prevents lateral movement.

🌐 Internet-Facing: HIGH - If SSH port (22) is exposed to the internet, attackers can directly exploit this without authentication.
🏢 Internal Only: HIGH - Even internally, any attacker with network access to the SSH service can exploit this vulnerability.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only SSH access and knowledge of the hardcoded keys; no authentication or special tools needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.5.0.56

Vendor Advisory: https://webresources.commscope.com/download/assets/RUCKUS+Network+Director%3A+Critical+Security+Bypass+Vulnerability+Leading+to+Remote+Code+Execution+and/3adeb3acb69211f08a46b6532db37357

Restart Required: Yes

Instructions:

1. Download RND version 4.5.0.56 or later from official RUCKUS support portal. 2. Backup current configuration. 3. Apply the update through the RND web interface. 4. Restart the appliance as required.

🔧 Temporary Workarounds

Block SSH Access

linux

Restrict SSH access to the RND appliance using firewall rules to only allow connections from trusted management networks.

iptables -A INPUT -p tcp --dport 22 -s TRUSTED_IP_RANGE -j ACCEPT
iptables -A INPUT -p tcp --dport 22 -j DROP

Change SSH Keys

linux

Generate and deploy new SSH keys for the postgres user to replace the hardcoded ones.

ssh-keygen -t rsa -b 4096 -f /path/to/new_key
cp new_key.pub ~postgres/.ssh/authorized_keys
chown -R postgres:postgres ~postgres/.ssh
chmod 600 ~postgres/.ssh/authorized_keys

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate RND appliances from untrusted networks
  • Monitor SSH authentication logs for unauthorized access attempts and implement alerting

🔍 How to Verify

Check if Vulnerable:

Check if SSH key fingerprint for postgres user matches known hardcoded keys or verify RND version is below 4.5.0.56

Check Version:

ssh postgres@RND_IP 'cat /opt/rnd/version.txt' or check web interface

Verify Fix Applied:

Verify RND version is 4.5.0.56 or higher and attempt SSH authentication with known hardcoded keys should fail

📡 Detection & Monitoring

Log Indicators:

  • Successful SSH authentication as postgres user
  • Failed SSH attempts followed by successful postgres login
  • Unusual database queries or administrative user creation

Network Indicators:

  • SSH connections to RND appliance from unexpected sources
  • Database connection attempts from postgres user to unusual destinations

SIEM Query:

source="auth.log" AND (user="postgres" AND action="accepted") OR (process="sshd" AND dest_ip="RND_IP")

🔗 References

📤 Share & Export