CVE-2025-57602

AiKaan · AiKaan IoT Management Platform

A critical vulnerability has been identified in the AiKaan IoT management platform, assigned a severity score of 9.8 out of 10.

Executive summary

A critical vulnerability has been identified in the AiKaan IoT management platform, assigned a severity score of 9.8 out of 10. The flaw stems from a poorly secured user account combined with a static, hardcoded credential, which allows a remote, unauthenticated attacker to easily gain access to the platform. Successful exploitation could lead to a complete compromise of the IoT management system, granting attackers control over connected devices and access to sensitive data.

Vulnerability

This vulnerability is a combination of two weaknesses. First, the proxyuser account on the AiKaan IoT management platform is insufficiently hardened, lacking proper security controls. Second, the platform utilizes a shared, hardcoded SSH private key for authentication. An attacker who obtains this static private key, either through reverse engineering the product or from public disclosure, can use it to remotely authenticate to the cloud management interface as the proxyuser without requiring any prior access or credentials. This provides a direct path for an unauthorized remote attacker to gain privileged access to the system.

Business impact

This vulnerability is rated as critical severity with a CVSS score of 9.8, indicating a high risk of compromise with significant potential impact. Successful exploitation grants an attacker remote access to the core of the IoT management infrastructure. This could lead to severe consequences, including the ability to control, manipulate, or disable entire fleets of connected IoT devices, exfiltrate sensitive operational or customer data, and use the compromised platform as a pivot point to launch further attacks against the internal corporate network. The potential for operational disruption, data breach, and reputational damage is exceptionally high.

Remediation

Immediate Action: The primary remediation step is to update all affected instances of the AiKaan IoT Management Platform to the latest version provided by the vendor. After applying the patch, administrators should actively monitor for any further exploitation attempts and conduct a thorough review of historical SSH access logs, specifically looking for connections from the proxyuser originating from unrecognized IP addresses.

Proactive Monitoring: Implement enhanced monitoring to detect potential indicators of compromise. Security teams should search system and authentication logs for successful and failed SSH login attempts by the proxyuser. Monitor network traffic for unusual connections to the management platform's SSH port (typically TCP/22) and any anomalous outbound traffic from the platform or its managed devices.

Compensating Controls: If immediate patching is not feasible, implement the following compensating controls to reduce risk:

  • Use a firewall or network access control list (ACL) to strictly limit SSH access to the management platform, allowing connections only from known, trusted administrative IP addresses.
  • If the proxyuser account is not critical for daily operations, consider temporarily disabling it until a patch can be applied.
  • Deploy network intrusion detection/prevention systems (IDS/IPS) with signatures that can identify the use of the known hardcoded key.

Exploitation status

Public Exploit Available: true

Analyst recommendation

Given the critical CVSS score of 9.8 and the public availability of the means to exploit it, this vulnerability represents a clear and present danger to the organization. We strongly recommend that all affected AiKaan products be patched immediately as the highest priority. If patching is delayed for any reason, the compensating controls, particularly firewall restrictions on SSH access, must be implemented without delay to mitigate the immediate threat of a system compromise. Continue to monitor for updates from the vendor and CISA regarding this vulnerability's exploitation status.