- Security researchers have found nine flaws on two heckling products
- The faults have not yet been corrected, so users must be wary
- Users have advised to limit access to wireless management environments
Nearly a dozen vulnerabilities have been found in two Ruckus Networks products which could be mistreated to take total control of the network environments in which they operate.
Ruckus Networks (formerly Ruckus Wireless) is a networking equipment manufacturer, whose products include Virtual Smart Zone (VSZ) and Ruckus Network Director (RND).
VSZ is a virtualized network controller that manages access points and access switches to the heckling. It is generally used by medium to large companies for centralized control, scalability and advanced Wi-Fi management management. RND, on the other hand, is a centralized network management platform used for the deployment, monitoring and maintenance of wire and wireless networks on a large scale.
Significant disturbance
At the time of the press, vulnerabilities remain unlikely, which endangers countless companies.
According to Noam Moshe of Claroty’s Research Arm Team82, these two carried nine vulnerabilities:
- CVE-2025-44957-Secrets coded hard in VSZ which allow you to bypass authentication and access to the administration level using manufactured HTTP headers and valid API keys
- CVE-2025-44962-Traversal of the path in VSZ which allows readings of arbitrary files for authenticated users
- CVE-2025-44954-VSZ has public / private SSH keys by default coded hard which allow anyone to connect to vulnerable devices with root access
- CVE-2025-44960-VSZ has an API route with a parameter controlled by the user which is not disinfected, allowing the execution of arbitrary operating system commands
- CVE-2025-44961-The order injection in VSZ allows an authenticated user to provide a non-artisanal IP address to an OS command
- CVE-2025-44963-RND uses a secret jwt backend coded key to coded, allowing anyone with him to forge valid administration session tokens
- CVE-2025-44955-RND includes an “imprisoned” environment with integrated jailbreak using a low and hard-mined password to obtain root access
- CVE-2025-6243-RND includes a privileged user (sshuser) with public / private SSH keys coded in hard which allow root access
- CVE-2025-44958-RND CRYPT The passwords stored with a low secret key coded in hard and can return them to text in clear if it is compromised
Moshe reported its conclusions to the CERT coordination of Carnegie Mellon University (CERT / CC), which confirmed that faults could be mistreated to disrupt companies.
“The impact of these vulnerabilities varies from the leak of information to the total wireless environment compromise managed by affected products. For example, an attacker having access to the network to Ruckus Wireless VSZ can operate the CVE-2025-44954 to obtain full access to the administrator who will lead to the total compromise of the VSZ wireless management environment, “explained the organization.
“In addition, several vulnerabilities can be chained to create chained attacks which can allow the attacker to combine attacks to bypass all security controls which only prevent specific attacks.”
The gravity scores have not yet been allocated and the heckling has not yet manifested a patch.
Consequently, to mitigate the risk, CERT / CC advises network administrators to limit access to wireless management environments using affected products, allowing a limited set of confidence users and their authenticated customers to manage the heckling infrastructure via a secure protocol.
Via Bleeping Compompute




