Skip to main content

CVE-2025-46123: n/a

High
VulnerabilityCVE-2025-46123cvecve-2025-46123
Published: Mon Jul 21 2025 (07/21/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue was discovered in CommScope Ruckus Unleashed prior to 200.15.6.212.14 and 200.17.7.0.139, and in Ruckus ZoneDirector prior to 10.5.1.0.279, where the authenticated configuration endpoint `/admin/_conf.jsp` writes the Wi-Fi guest password to memory with snprintf using the attacker-supplied value as the format string; a crafted password therefore triggers uncontrolled format-string processing and enables remote code execution on the controller.

AI-Powered Analysis

AILast updated: 07/29/2025, 01:08:47 UTC

Technical Analysis

CVE-2025-46123 is a high-severity vulnerability affecting CommScope Ruckus Unleashed wireless controllers prior to versions 200.15.6.212.14 and 200.17.7.0.139, as well as Ruckus ZoneDirector controllers prior to version 10.5.1.0.279. The vulnerability arises from improper handling of the Wi-Fi guest password in the authenticated configuration endpoint `/admin/_conf.jsp`. Specifically, the endpoint uses the C function snprintf to write the guest password to memory, but it incorrectly uses the attacker-supplied password as the format string. This results in an uncontrolled format string vulnerability (CWE-134), which can be exploited to execute arbitrary code remotely on the controller. The attacker must have authenticated access to the configuration interface, but no user interaction beyond that is required. Exploitation could allow an attacker to gain full control over the wireless controller, potentially leading to compromise of the network infrastructure managed by the device. The vulnerability has a CVSS v3.1 base score of 7.2, reflecting its high impact on confidentiality, integrity, and availability due to remote code execution capabilities. No known exploits are currently reported in the wild, but the vulnerability is publicly disclosed and should be considered a significant risk to affected deployments. No official patches or mitigation links are provided in the data, indicating that organizations must monitor vendor advisories closely for updates or apply workarounds where possible.

Potential Impact

For European organizations, this vulnerability poses a serious risk to the security and stability of their wireless network infrastructure. Ruckus wireless controllers are commonly used in enterprise, education, hospitality, and public sector environments across Europe. Successful exploitation could allow attackers to execute arbitrary code on the controller, leading to unauthorized access to network management functions, interception or manipulation of network traffic, and potential lateral movement within the corporate network. This could result in data breaches, disruption of wireless services, and compromise of sensitive information. Given the authenticated access requirement, insider threats or compromised credentials could be leveraged to exploit this vulnerability. The impact is heightened in critical infrastructure sectors and organizations with large-scale wireless deployments, where network availability and integrity are paramount. Additionally, the vulnerability could be exploited as a foothold for further attacks against European organizations, especially those with strategic importance or handling sensitive data.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should: 1) Immediately verify if their Ruckus Unleashed or ZoneDirector controllers are running affected versions and prioritize upgrading to the fixed versions once released by CommScope. 2) Restrict access to the administrative interface `/admin/_conf.jsp` by implementing strong network segmentation, limiting management access to trusted IP addresses, and enforcing multi-factor authentication for all administrative accounts. 3) Regularly audit and rotate administrative credentials to reduce the risk of credential compromise. 4) Monitor network and device logs for unusual activity indicative of exploitation attempts, such as unexpected format string anomalies or unauthorized configuration changes. 5) If patches are not yet available, consider temporarily disabling guest Wi-Fi functionality or restricting guest password changes until a fix is applied. 6) Employ intrusion detection/prevention systems capable of detecting format string exploitation patterns targeting these controllers. 7) Maintain an up-to-date asset inventory and vulnerability management process to ensure timely identification and remediation of such vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-04-22T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 687e52aea83201eaac106025

Added to database: 7/21/2025, 2:46:06 PM

Last enriched: 7/29/2025, 1:08:47 AM

Last updated: 8/5/2025, 2:20:27 AM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats