Cyber Posture

CVE-2025-30234

High

Published: 19 March 2025

Published
19 March 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 8.3 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
EPSS Score 0.0013 31.3th percentile
Risk Priority 17 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-30234 is a high-severity Use of Hard-coded Cryptographic Key (CWE-321) vulnerability in Tritondatacenter (inferred from references). Its CVSS base score is 8.3 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Adversary-in-the-Middle (T1557); ranked at the 31.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 IA-5 (Authenticator Management) and SC-12 (Cryptographic Key Establishment and Management).

Threat & Defense at a Glance

What attackers do: exploitation maps to Adversary-in-the-Middle (T1557). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires establishment and management of cryptographic keys, directly preventing the embedding and use of static, hard-coded SSH host keys in system images.

prevent

Mandates proper management of authenticators including changing default content and protecting from unauthorized disclosure, addressing static SSH host keys as default authenticators.

detectrespondrecover

Provides a process to identify, report, and correct flaws like CVE-2025-30234 in a timely manner, enabling remediation of vulnerable images with static SSH keys.

MITRE ATT&CK Enterprise TechniquesAI

T1557 Adversary-in-the-Middle Credential Access
Adversaries may attempt to position themselves between two or more networked devices using an adversary-in-the-middle (AiTM) technique to support follow-on behaviors such as [Network Sniffing](https://attack.
Why these techniques?

Hardcoded static SSH host keys in the image enable an attacker on an adjacent network to impersonate the SSH server and perform adversary-in-the-middle attacks (e.g., via traffic redirection), directly facilitating session interception or credential capture due to the known private key.

Confidence: MEDIUM · MITRE ATT&CK Enterprise v19.0

NVD Description

SmartOS, as used in Triton Data Center and other products, has static host SSH keys in the 60f76fd2-143f-4f57-819b-1ae32684e81b image (a Debian 12 LX zone image from 2024-07-26).

Deeper analysisAI

CVE-2025-30234 is a vulnerability in SmartOS, as used in Triton Data Center and other products, involving static host SSH keys embedded in the 60f76fd2-143f-4f57-819b-1ae32684e81b image—a Debian 12 LX zone image from 2024-07-26. Published on 2025-03-19, it is associated with CWE-321 (Use of Hard-coded Cryptographic Key) and carries a CVSS v3.1 base score of 8.3 (AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H).

An attacker on an adjacent network (AV:A) with no privileges (PR:N) and no user interaction (UI:N) can exploit this high-complexity (AC:H) issue. Exploitation enables high-impact confidentiality, integrity, and availability effects (C:I:A:H) across a changed scope (S:C), potentially allowing unauthorized access or control via the static SSH keys.

Advisories with mitigation guidance include Triton Data Center's TPS-2025-002 at https://security.tritondatacenter.com/tps-2025-002/, a SmartOS discussion thread at https://smartos.topicbox.com/groups/smartos-discuss/Ta6f13072e6bedddc-M3702e993edd7d6ce8d78dfc8, and an oss-security mailing list post at https://www.openwall.com/lists/oss-security/2025/03/13/10.

Details

CWE(s)

Affected Products

Tritondatacenter
inferred from references and description; NVD did not file a CPE for this CVE

CVEs Like This One

CVE-2025-30095Shared CWE-321
CVE-2026-32644Shared CWE-321
CVE-2026-32324Shared CWE-321
CVE-2025-15016Shared CWE-321
CVE-2025-8625Shared CWE-321
CVE-2025-55619Shared CWE-321
CVE-2025-34256Shared CWE-321
CVE-2025-27674Shared CWE-321
CVE-2024-54027Shared CWE-321
CVE-2025-41702Shared CWE-321

References