Cyber Posture

CVE-2025-44957

High

Published: 04 August 2025

Published
04 August 2025
Modified
03 November 2025
KEV Added
Patch
CVSS Score 8.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
EPSS Score 0.0011 28.8th percentile
Risk Priority 17 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-44957 is a high-severity Authentication Bypass Using an Alternate Path or Channel (CWE-288) vulnerability in Commscope Ruckus Smartzone Firmware. Its CVSS base score is 8.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 28.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Privilege Escalation (T1068) and 6 other techniques. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates this CVE by requiring timely remediation through patching to Ruckus SmartZone 6.1.2p3 Refresh Build or later, as recommended by the vendor.

prevent

Requires validation of information inputs like crafted HTTP headers to prevent attackers from bypassing authentication even with a valid API key.

prevent

Mandates enforcement of approved authorizations, countering the authentication bypass that allows low-privileged access to high-impact operations.

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
T1078 Valid Accounts Stealth
Adversaries may obtain and abuse credentials of existing accounts as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion.
T1059 Command and Scripting Interpreter Execution
Adversaries may abuse command and script interpreters to execute commands, scripts, or binaries.
T1083 File and Directory Discovery Discovery
Adversaries may enumerate files and directories or may search in specific locations of a host or network share for certain information within a file system.
T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1210 Exploitation of Remote Services Lateral Movement
Adversaries may exploit remote services to gain unauthorized access to internal systems once inside of a network.
T1552 Unsecured Credentials Credential Access
Adversaries may search compromised systems to find and obtain insecurely stored credentials.
Why these techniques?

Vulnerabilities including auth bypass via hardcoded secrets/API keys (T1078, T1552, T1068), arbitrary file read via path traversal (T1083), command injection RCE (T1059), and exploitation of the public-facing management web API/remote services (T1190, T1210).

NVD Description

Ruckus SmartZone (SZ) before 6.1.2p3 Refresh Build allows authentication bypass via a valid API key and crafted HTTP headers.

Deeper analysisAI

CVE-2025-44957 is an authentication bypass vulnerability in Ruckus SmartZone (SZ) versions before 6.1.2p3 Refresh Build. The issue allows attackers to circumvent authentication mechanisms by leveraging a valid API key alongside crafted HTTP headers. It carries a CVSS v3.1 base score of 8.5 (AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H) and maps to CWE-288.

The vulnerability can be exploited by a low-privileged user (PR:L) with network access (AV:N), though it demands high attack complexity (AC:H) and requires no user interaction (UI:N). Successful exploitation changes scope (S:C), granting high-impact access to confidentiality, integrity, and availability (C:I:A:H), potentially enabling full system compromise.

Mitigation guidance from vendor and third-party advisories, including CommScope's security advisory (ID 20250710), CERT vulnerability note VU#613753, and Claroty Team82's disclosure, centers on upgrading to Ruckus SmartZone 6.1.2p3 Refresh Build or later. Relevant resources are available at https://claroty.com/team82/disclosure-dashboard/cve-2025-44957, https://kb.cert.org/vuls/id/613753, https://webresources.commscope.com/download/assets/FAQ+Security+Advisory%3A+ID+20250710/225f44ac3bd311f095821adcaa92e24e, and https://www.kb.cert.org/vuls/id/613753.

Details

CWE(s)

Affected Products

commscope
ruckus smartzone firmware
6.1.2, 7.0.0, 7.1.0 · ≤ 6.1.2
commscope
ruckus network director
≤ 4.5.0.51

CVEs Like This One

CVE-2025-44961Same product: Commscope Ruckus C110
CVE-2025-44960Same product: Commscope Ruckus C110
CVE-2025-46120Same product: Commscope Ruckus C110
CVE-2025-44963Same product: Commscope Ruckus Network Director
CVE-2025-67304Same product: Commscope Ruckus Network Director
CVE-2025-46121Same product: Commscope Ruckus C110
CVE-2025-46117Same product: Commscope Ruckus C110
CVE-2025-46122Same product: Commscope Ruckus C110
CVE-2025-67305Same product: Commscope Ruckus Network Director
CVE-2026-27390Shared CWE-288

References