CVE-2025-30234
Published: 19 March 2025
Summary
CVE-2025-30234 is a high-severity Use of Hard-coded Cryptographic Key (CWE-321) vulnerability in Tritondatacenter (inferred from references). Its CVSS base score is 8.3 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Adversary-in-the-Middle (T1557); ranked at the 31.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 IA-5 (Authenticator Management) and SC-12 (Cryptographic Key Establishment and Management).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Requires establishment and management of cryptographic keys, directly preventing the embedding and use of static, hard-coded SSH host keys in system images.
Mandates proper management of authenticators including changing default content and protecting from unauthorized disclosure, addressing static SSH host keys as default authenticators.
Provides a process to identify, report, and correct flaws like CVE-2025-30234 in a timely manner, enabling remediation of vulnerable images with static SSH keys.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Hardcoded static SSH host keys in the image enable an attacker on an adjacent network to impersonate the SSH server and perform adversary-in-the-middle attacks (e.g., via traffic redirection), directly facilitating session interception or credential capture due to the known private key.
NVD Description
SmartOS, as used in Triton Data Center and other products, has static host SSH keys in the 60f76fd2-143f-4f57-819b-1ae32684e81b image (a Debian 12 LX zone image from 2024-07-26).
Deeper analysisAI
CVE-2025-30234 is a vulnerability in SmartOS, as used in Triton Data Center and other products, involving static host SSH keys embedded in the 60f76fd2-143f-4f57-819b-1ae32684e81b image—a Debian 12 LX zone image from 2024-07-26. Published on 2025-03-19, it is associated with CWE-321 (Use of Hard-coded Cryptographic Key) and carries a CVSS v3.1 base score of 8.3 (AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H).
An attacker on an adjacent network (AV:A) with no privileges (PR:N) and no user interaction (UI:N) can exploit this high-complexity (AC:H) issue. Exploitation enables high-impact confidentiality, integrity, and availability effects (C:I:A:H) across a changed scope (S:C), potentially allowing unauthorized access or control via the static SSH keys.
Advisories with mitigation guidance include Triton Data Center's TPS-2025-002 at https://security.tritondatacenter.com/tps-2025-002/, a SmartOS discussion thread at https://smartos.topicbox.com/groups/smartos-discuss/Ta6f13072e6bedddc-M3702e993edd7d6ce8d78dfc8, and an oss-security mailing list post at https://www.openwall.com/lists/oss-security/2025/03/13/10.
Details
- CWE(s)