CVE-2025-44963

RUCKUS Network Director (RND) before 4.5 allows spoofing of an administrator JWT by an attacker who knows the hardcoded value of a certain secret key.
Configurations

Configuration 1 (hide)

cpe:2.3:a:commscope:ruckus_network_director:*:*:*:*:*:*:*:*

History

23 Sep 2025, 18:48

Type Values Removed Values Added
CPE cpe:2.3:a:commscope:ruckus_network_director:*:*:*:*:*:*:*:*
First Time Commscope
Commscope ruckus Network Director
References () https://claroty.com/team82/disclosure-dashboard/cve-2025-44963 - () https://claroty.com/team82/disclosure-dashboard/cve-2025-44963 - Third Party Advisory
References () https://kb.cert.org/vuls/id/613753 - () https://kb.cert.org/vuls/id/613753 - Third Party Advisory
References () https://webresources.commscope.com/download/assets/FAQ+Security+Advisory%3A+ID+20250710/225f44ac3bd311f095821adcaa92e24e - () https://webresources.commscope.com/download/assets/FAQ+Security+Advisory%3A+ID+20250710/225f44ac3bd311f095821adcaa92e24e - Vendor Advisory

05 Aug 2025, 14:34

Type Values Removed Values Added
Summary
  • (es) RUCKUS Network Director (RND) anterior a la versión 4.5 permite la suplantación de un JWT de administrador por parte de un atacante que conoce el valor codificado de una determinada clave secreta.

04 Aug 2025, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-08-04 17:15

Updated : 2025-09-23 18:48


NVD link : CVE-2025-44963

Mitre link : CVE-2025-44963

CVE.ORG link : CVE-2025-44963


JSON object : View

Products Affected

commscope

  • ruckus_network_director
CWE
CWE-321

Use of Hard-coded Cryptographic Key