CVE-2025-69426 (CNNVD-202601-1609)
中文标题:
Ruckus vRIoT IoT Controller 信任管理问题漏洞
英文标题:
Ruckus vRIoT IoT Controller < 3.0.0.0 Hardcoded SSH Credentials RCE
漏洞描述
中文描述:
Ruckus vRIoT IoT Controller是美国Ruckus公司的一个虚拟无线物联网控制器。 Ruckus vRIoT IoT Controller 3.0.0.0之前版本存在信任管理问题漏洞,该漏洞源于硬编码凭据,可能导致执行任意代码。
英文描述:
The Ruckus vRIoT IoT Controller firmware versions prior to 3.0.0.0 (GA) contain hardcoded credentials for an operating system user account within an initialization script. The SSH service is network-accessible without IP-based restrictions. Although the configuration disables SCP and pseudo-TTY allocation, an attacker can authenticate using the hardcoded credentials and establish SSH local port forwarding to access the Docker socket. By mounting the host filesystem via Docker, an attacker can escape the container and execute arbitrary OS commands as root on the underlying vRIoT controller, resulting in complete system compromise.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| RUCKUS Networks | vRIoT IOT Controller | - | < 3.0.0.0 (GA) | - |
cpe:2.3:a:ruckus_networks:vriot_iot_controller:*:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
CVSS评分详情
4.0 (cna)
CRITICALCVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2025-69426 |
2026-01-10 04:00:25 | 2026-01-12 02:12:33 |
| NVD | nvd_CVE-2025-69426 |
2026-01-10 04:01:03 | 2026-01-12 02:28:15 |
| CNNVD | cnnvd_CNNVD-202601-1609 |
2026-01-13 07:38:24 | 2026-01-13 07:41:12 |
版本与语言
安全公告
变更历史
查看详细变更
- vulnerability_type: 未提取 -> 信任管理问题
- cnnvd_id: 未提取 -> CNNVD-202601-1609
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- affected_products_count: 3 -> 1
- data_sources: ['cve'] -> ['cve', 'nvd']