The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2025-44954

CVE-2025-44954: Ruckus SmartZone Auth Bypass Vulnerability

CVE-2025-44954 is an authentication bypass flaw in Commscope Ruckus SmartZone firmware caused by a hardcoded SSH private key for root-level access. This article covers technical details, affected versions, and mitigations.

Published: March 11, 2026

CVE-2025-44954 Overview

CVE-2025-44954 is a critical hardcoded credentials vulnerability affecting RUCKUS SmartZone (SZ) wireless controller firmware before version 6.1.2p3 Refresh Build. The vulnerability stems from a hardcoded SSH private key embedded in the firmware for a root-equivalent user account, enabling unauthorized remote access with full administrative privileges.

This type of vulnerability (CWE-1394) represents a severe security misconfiguration where cryptographic keys are statically embedded in firmware, allowing any attacker who extracts or discovers this key to authenticate as a privileged user on any affected device. Given the widespread deployment of RUCKUS SmartZone controllers in enterprise wireless networks, this vulnerability poses significant risk to network infrastructure security.

Critical Impact

Attackers with knowledge of the hardcoded SSH private key can gain root-level access to affected RUCKUS SmartZone controllers over the network without authentication, potentially compromising entire wireless network infrastructure.

Affected Products

  • CommScope RUCKUS SmartZone Firmware (versions before 6.1.2p3 Refresh Build)
  • CommScope RUCKUS Virtual SmartZone
  • CommScope RUCKUS Virtual SmartZone-Federal
  • CommScope RUCKUS SmartZone 100/100-D/144/144-Federal/300/300-Federal Hardware
  • CommScope RUCKUS Access Points: C110, E510, H320, H350, H510, M510
  • CommScope RUCKUS Access Points: R320, R510, R560, R610, R710, R720, R730, R750
  • CommScope RUCKUS Outdoor Access Points: T310c, T310d, T310n, T310s, T350se, T750, T750se

Discovery Timeline

  • 2025-08-04 - CVE-2025-44954 published to NVD
  • 2025-08-07 - Last updated in NVD database

Technical Details for CVE-2025-44954

Vulnerability Analysis

This vulnerability exists because the RUCKUS SmartZone firmware contains a hardcoded SSH private key that corresponds to a root-equivalent user account. The fundamental security flaw lies in the practice of embedding static cryptographic credentials directly into firmware images that are distributed to all customers.

When firmware is compiled and distributed with identical SSH keys across all deployments, a single key compromise—whether through firmware extraction, reverse engineering, or disclosure—immediately affects every device running that firmware version. The attacker does not need to discover credentials through brute force or social engineering; they simply need access to the embedded key material.

The impact of successful exploitation includes complete system compromise with root-level privileges, the ability to intercept and modify wireless network traffic, potential for lateral movement across the managed wireless infrastructure, and the ability to persist on devices even after password changes to other accounts.

Root Cause

The root cause of CVE-2025-44954 is the use of hardcoded cryptographic credentials (CWE-1394) in the firmware development and deployment process. Rather than generating unique SSH key pairs during device initialization or first boot, the firmware shipped with pre-generated static keys that were identical across all installations.

This practice likely originated from development or debugging requirements where engineers needed consistent access to devices during testing. However, these keys were not removed or regenerated before production firmware releases, resulting in a critical security vulnerability that persists across the entire installed base of affected devices.

Attack Vector

The attack vector for this vulnerability is network-based, requiring no authentication, no user interaction, and presenting low attack complexity. An attacker can exploit this vulnerability by:

  1. Obtaining the hardcoded SSH private key from firmware extraction or public disclosure
  2. Scanning for RUCKUS SmartZone devices with SSH services exposed (typically port 22)
  3. Authenticating to discovered devices using the extracted private key
  4. Gaining immediate root-level shell access to the management controller

Once access is obtained, the attacker has full control over the SmartZone controller and all managed access points, enabling configuration modification, traffic interception, backdoor installation, or denial of service attacks against the wireless infrastructure.

The vulnerability is particularly severe because it affects network infrastructure devices that often manage entire enterprise wireless deployments, potentially providing access to thousands of access points from a single compromised controller.

Detection Methods for CVE-2025-44954

Indicators of Compromise

  • Unexpected SSH login events to SmartZone controllers, particularly from external or unknown IP addresses
  • Authentication logs showing successful root-equivalent user logins that were not initiated by authorized administrators
  • Configuration changes to SmartZone controllers without corresponding change tickets or administrator actions
  • New or modified authorized_keys files or SSH configurations on affected devices

Detection Strategies

  • Monitor SSH authentication logs on SmartZone controllers for anomalous login patterns or unexpected source IP addresses
  • Deploy network detection rules to identify SSH connections to SmartZone management interfaces from unauthorized network segments
  • Implement host-based intrusion detection on SmartZone controllers to alert on suspicious root-level activities
  • Review firmware versions across all RUCKUS SmartZone deployments to identify vulnerable installations

Monitoring Recommendations

  • Enable comprehensive logging on SmartZone controllers and forward logs to a centralized SIEM platform
  • Establish baseline SSH access patterns and alert on deviations from normal administrative behavior
  • Monitor for firmware extraction attempts or unusual file access patterns that could indicate credential harvesting
  • Implement network segmentation to limit SSH access to SmartZone management interfaces from trusted administrator subnets only

How to Mitigate CVE-2025-44954

Immediate Actions Required

  • Upgrade all RUCKUS SmartZone controllers to firmware version 6.1.2p3 Refresh Build or later immediately
  • Restrict SSH access to SmartZone management interfaces to trusted administrator IP ranges using firewall rules or access control lists
  • Audit SmartZone controllers for signs of unauthorized access or configuration modifications
  • Review and rotate any credentials that may have been exposed through compromised SmartZone controllers

Patch Information

CommScope has released security patches addressing this vulnerability. Organizations should upgrade to RUCKUS SmartZone firmware version 6.1.2p3 Refresh Build or later. The vendor has published a security advisory with detailed remediation guidance available at the CommScope Security Advisory ID 20250710.

Additional technical details are available from Claroty Team82 Disclosure Dashboard and CERT/CC Vulnerability Note VU#613753.

Workarounds

  • Disable SSH access to SmartZone controllers entirely if remote CLI access is not operationally required
  • Implement network segmentation to isolate SmartZone management interfaces from untrusted networks
  • Deploy jump hosts or bastion servers for administrative access, reducing direct SSH exposure
  • Monitor all SSH connections to SmartZone controllers using network intrusion detection systems until patching is complete
bash
# Example: Restrict SSH access using firewall rules (Linux-based firewall)
# Allow SSH only from trusted administrator subnet
iptables -A INPUT -p tcp --dport 22 -s 10.0.100.0/24 -j ACCEPT
iptables -A INPUT -p tcp --dport 22 -j DROP

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeAuth Bypass

  • Vendor/TechRuckus Smartzone

  • SeverityCRITICAL

  • CVSS Score9.8

  • EPSS Probability0.06%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-1394
  • Technical References
  • Claroty CVE-2025-44954 Disclosure

  • CERT Vulnerability ID 613753
  • Vendor Resources
  • CommScope Security Advisory ID 20250710
  • Related CVEs
  • CVE-2025-44957: Ruckus SmartZone Authentication Bypass
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English