Skip to main content

CVE-2025-46119: n/a

Medium
VulnerabilityCVE-2025-46119cvecve-2025-46119
Published: Mon Jul 21 2025 (07/21/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue was discovered in CommScope Ruckus Unleashed prior to 200.15.6.212.27 and 200.18.7.1.323, and in Ruckus ZoneDirector prior to 10.5.1.0.282, where an authenticated request to the management endpoint `/admin/_cmdstat.jsp` discloses the administrator password in a trivially reversible obfuscated form. The same obfuscation method persists in configuration prior to 200.18.7.1.302, allowing anyone who obtains the system configuration to recover the plaintext credentials.

AI-Powered Analysis

AILast updated: 07/29/2025, 01:13:38 UTC

Technical Analysis

CVE-2025-46119 is a medium-severity vulnerability affecting CommScope Ruckus Unleashed wireless access points and Ruckus ZoneDirector network controllers. The flaw exists in versions prior to 200.15.6.212.27 and 200.18.7.1.323 for Unleashed, and prior to 10.5.1.0.282 for ZoneDirector. An authenticated user making a request to the management endpoint `/admin/_cmdstat.jsp` can retrieve the administrator password in an obfuscated form that is trivially reversible. Additionally, the same weak obfuscation method is used in configuration files prior to version 200.18.7.1.302, meaning that if an attacker obtains the system configuration, they can recover plaintext credentials easily. The vulnerability is classified under CWE-555 (Reliance on Obfuscation or Encryption Without Integrity Checking), indicating that the protection mechanism is insufficient to prevent credential disclosure. The CVSS v3.1 base score is 6.3 (medium), reflecting that the attack vector is network-based, requires low complexity, and needs privileges (authenticated user), but no user interaction. The impact affects confidentiality, integrity, and availability to a limited extent since credentials can be exposed and potentially used to escalate privileges or disrupt network management. No known exploits are currently reported in the wild, and no official patches are linked yet, though affected versions are specified. This vulnerability highlights a critical weakness in credential storage and management within these widely deployed wireless infrastructure products, potentially enabling attackers with some access to gain full administrative control by reversing the obfuscation to obtain passwords.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the security of their wireless network infrastructure. Ruckus Unleashed and ZoneDirector products are commonly used in enterprise, education, hospitality, and public sector environments across Europe. Exposure of administrator credentials could allow attackers to take over wireless controllers, modify network configurations, intercept or redirect traffic, and potentially pivot to other internal systems. This could lead to data breaches, service disruptions, and loss of network integrity. Given the medium CVSS score, the threat is serious but requires an authenticated user, which may limit remote exploitation unless credentials are compromised or insider threats exist. However, the trivial reversibility of the obfuscation means that once access is gained, lateral movement and privilege escalation become straightforward. The impact on confidentiality is notable as passwords are exposed; integrity and availability impacts arise from potential unauthorized configuration changes or denial of service. European organizations with large deployments of these products, especially in critical infrastructure sectors, should prioritize addressing this vulnerability to prevent potential exploitation.

Mitigation Recommendations

1. Immediate mitigation involves upgrading affected Ruckus Unleashed and ZoneDirector devices to the latest firmware versions where this vulnerability is fixed. Organizations should monitor CommScope's advisories for official patches and apply them promptly. 2. Restrict access to management interfaces strictly to trusted administrators via network segmentation, VPNs, or zero-trust access controls to reduce the risk of authenticated attackers exploiting this flaw. 3. Implement strong authentication mechanisms such as multi-factor authentication (MFA) for management access to reduce the likelihood of credential compromise. 4. Regularly audit and monitor logs for suspicious access patterns to the `/admin/_cmdstat.jsp` endpoint or configuration downloads. 5. Avoid storing or distributing configuration backups in unsecured locations, as these contain obfuscated but easily reversible credentials. 6. Consider rotating administrator passwords after patching to invalidate any credentials potentially exposed. 7. Educate administrators about the risks of this vulnerability and enforce strict credential management policies. These steps go beyond generic advice by focusing on access control hardening, monitoring, and secure configuration management tailored to the specifics of this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-04-22T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 687e52aea83201eaac106039

Added to database: 7/21/2025, 2:46:06 PM

Last enriched: 7/29/2025, 1:13:38 AM

Last updated: 8/9/2025, 1:19:07 PM

Views: 17

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats