CVE-2025-67304

CRITICAL

Ruckus Network Director <4.5.0.54 - Auth Bypass

Title source: llm
STIX 2.1

Description

In Ruckus Network Director (RND) < 4.5.0.54, the OVA appliance contains hardcoded credentials for the ruckus PostgreSQL database user. In the default configuration, the PostgreSQL service is accessible over the network on TCP port 5432. An attacker can use the hardcoded credentials to authenticate remotely, gaining superuser access to the database. This allows creation of administrative users for the web interface, extraction of password hashes, and execution of arbitrary OS commands.

Scores

CVSS v3 9.8
EPSS 0.0014
EPSS Percentile 32.9%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation poc
Automatable yes
Technical Impact total

Details

CWE
CWE-798
Status published
Products (1)
commscope/ruckus_network_director < 4.5.0.56
Published Feb 19, 2026
Tracked Since Feb 19, 2026