Ruckus SmartZone (SZ) before 6.1.2p3 Refresh Build allows authentication bypass via a valid API key and crafted HTTP headers.
References
Link | Resource |
---|---|
https://claroty.com/team82/disclosure-dashboard/cve-2025-44957 | Third Party Advisory |
https://kb.cert.org/vuls/id/613753 | Third Party Advisory US Government Resource |
https://webresources.commscope.com/download/assets/FAQ+Security+Advisory%3A+ID+20250710/225f44ac3bd311f095821adcaa92e24e | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
|
History
07 Aug 2025, 17:59
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:h:commscope:ruckus_r710:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_t310n:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_smartzone_144:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_t310d:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_h320:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_smartzone_100:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_t750:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_r610:-:*:*:*:*:*:*:* cpe:2.3:o:commscope:ruckus_smartzone_firmware:6.1.2:-:*:*:*:*:*:* cpe:2.3:a:commscope:ruckus_virtual_smartzone-federal:-:*:*:*:*:*:*:* cpe:2.3:a:commscope:ruckus_network_director:*:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_r510:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_r560:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_r320:-:*:*:*:*:*:*:* cpe:2.3:o:commscope:ruckus_smartzone_firmware:6.1.2:p3:*:*:*:*:*:* cpe:2.3:o:commscope:ruckus_smartzone_firmware:7.1.0:*:*:*:*:*:*:* cpe:2.3:a:commscope:ruckus_virtual_smartzone:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_t350se:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_smartzone_100-d:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_c110:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_smartzone_144-federal:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_m510:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_t750se:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_r730:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_t310c:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_r720:-:*:*:*:*:*:*:* cpe:2.3:o:commscope:ruckus_smartzone_firmware:6.1.2:p2:*:*:*:*:*:* cpe:2.3:o:commscope:ruckus_smartzone_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_h350:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_t310s:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_h510:-:*:*:*:*:*:*:* cpe:2.3:o:commscope:ruckus_smartzone_firmware:7.0.0:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_smartzone_300:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_e510:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_r750:-:*:*:*:*:*:*:* cpe:2.3:h:commscope:ruckus_smartzone_300-federal:-:*:*:*:*:*:*:* |
|
References | () https://claroty.com/team82/disclosure-dashboard/cve-2025-44957 - Third Party Advisory | |
References | () https://kb.cert.org/vuls/id/613753 - Third Party Advisory, US Government Resource | |
References | () https://webresources.commscope.com/download/assets/FAQ+Security+Advisory%3A+ID+20250710/225f44ac3bd311f095821adcaa92e24e - Vendor Advisory | |
First Time |
Commscope ruckus H510
Commscope ruckus T310n Commscope ruckus R710 Commscope ruckus H350 Commscope ruckus T310d Commscope Commscope ruckus R720 Commscope ruckus Virtual Smartzone-federal Commscope ruckus Smartzone 300 Commscope ruckus R750 Commscope ruckus Smartzone 144 Commscope ruckus H320 Commscope ruckus R560 Commscope ruckus Smartzone 300-federal Commscope ruckus R320 Commscope ruckus Network Director Commscope ruckus E510 Commscope ruckus Virtual Smartzone Commscope ruckus T350se Commscope ruckus Smartzone 144-federal Commscope ruckus T310c Commscope ruckus R610 Commscope ruckus M510 Commscope ruckus C110 Commscope ruckus Smartzone 100 Commscope ruckus Smartzone Firmware Commscope ruckus T310s Commscope ruckus R510 Commscope ruckus T750se Commscope ruckus T750 Commscope ruckus R730 Commscope ruckus Smartzone 100-d |
05 Aug 2025, 14:34
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
04 Aug 2025, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-08-04 17:15
Updated : 2025-08-07 17:59
NVD link : CVE-2025-44957
Mitre link : CVE-2025-44957
CVE.ORG link : CVE-2025-44957
JSON object : View
Products Affected
commscope
- ruckus_e510
- ruckus_smartzone_100-d
- ruckus_t310s
- ruckus_t310n
- ruckus_virtual_smartzone-federal
- ruckus_smartzone_144-federal
- ruckus_c110
- ruckus_r610
- ruckus_h320
- ruckus_r750
- ruckus_h510
- ruckus_h350
- ruckus_smartzone_300-federal
- ruckus_t310d
- ruckus_virtual_smartzone
- ruckus_t750
- ruckus_network_director
- ruckus_smartzone_100
- ruckus_r720
- ruckus_t350se
- ruckus_r560
- ruckus_r710
- ruckus_r510
- ruckus_smartzone_firmware
- ruckus_t310c
- ruckus_t750se
- ruckus_m510
- ruckus_r320
- ruckus_r730
- ruckus_smartzone_144
- ruckus_smartzone_300
CWE
CWE-288
Authentication Bypass Using an Alternate Path or Channel