CVE-2025-44954
RUCKUS · RUCKUS SmartZone Multiple Products
A critical vulnerability has been identified in multiple RUCKUS SmartZone products, stemming from a hardcoded SSH private key for a root-equivalent user account.
Executive summary
A critical vulnerability has been identified in multiple RUCKUS SmartZone products, stemming from a hardcoded SSH private key for a root-equivalent user account. This flaw allows an attacker who possesses this widely available key to gain complete administrative control over any unpatched device, bypassing standard authentication. Successful exploitation could lead to a full compromise of the network infrastructure managed by the SmartZone controller.
Vulnerability
The vulnerability exists because a static, non-unique SSH private key for a high-privilege user is embedded within the device's firmware. An attacker can extract this key from any publicly available firmware image or a compromised device. Using this single private key, the attacker can then successfully authenticate via SSH to any vulnerable RUCKUS SmartZone device on the network, gaining privileged access equivalent to the root user without needing a valid password.
Business impact
This vulnerability is rated as critical severity with a CVSS score of 9. A successful exploit would result in a complete compromise of the RUCKUS SmartZone controller, which serves as the central management plane for the wireless network. An attacker could reconfigure Wi-Fi networks, create rogue access points, intercept sensitive user traffic, deploy malware, or use the compromised controller as a pivot point to launch further attacks against the internal corporate network. This poses a significant risk to data confidentiality, integrity, and the availability of network services.
Remediation
Immediate Action: The primary remediation is to upgrade all affected RUCKUS SmartZone instances to version 6.1.2p3 Refresh Build or a later version, which removes the hardcoded key. After patching, administrators should immediately review SSH access logs for any connections from unknown or suspicious IP addresses that may have occurred prior to the update.
Proactive Monitoring: Continuously monitor SSH authentication logs on SmartZone controllers for successful logins from unexpected source IP addresses or at unusual times. Implement alerts for any login activity related to the default or hidden user accounts. Network traffic monitoring should be configured to detect anomalous outbound connections originating from the SmartZone controllers.
Compensating Controls: If immediate patching is not feasible, implement strict firewall rules to restrict SSH access (TCP port 22) to the SmartZone management interface. Access should only be permitted from a limited set of whitelisted IP addresses belonging to trusted network administrators. Disabling SSH is an option if it is not required for management, but this may impact operational capabilities.
Exploitation status
Public Exploit Available: true
Analyst recommendation
Given the critical severity (CVSS 9) and the trivial nature of exploitation, this vulnerability requires immediate attention. We strongly recommend that all organizations using the affected RUCKUS products apply the security update provided by the vendor without delay. While this CVE is not currently on the CISA KEV list, vulnerabilities involving hardcoded credentials are a common target for widespread exploitation and are often added. In parallel with patching, implement compensating controls such as firewall restrictions to limit the attack surface and mitigate risk from potential scanning and exploitation attempts.