CVE-2025-46123: n/a
An issue was discovered in CommScope Ruckus Unleashed prior to 200.15.6.212.14 and 200.17.7.0.139, and in Ruckus ZoneDirector prior to 10.5.1.0.279, where the authenticated configuration endpoint `/admin/_conf.jsp` writes the Wi-Fi guest password to memory with snprintf using the attacker-supplied value as the format string; a crafted password therefore triggers uncontrolled format-string processing and enables remote code execution on the controller.
AI Analysis
Technical Summary
CVE-2025-46123 is a high-severity vulnerability affecting CommScope Ruckus Unleashed wireless controllers prior to versions 200.15.6.212.14 and 200.17.7.0.139, as well as Ruckus ZoneDirector controllers prior to version 10.5.1.0.279. The vulnerability arises from improper handling of the Wi-Fi guest password in the authenticated configuration endpoint `/admin/_conf.jsp`. Specifically, the endpoint uses the C function snprintf to write the guest password to memory, but it incorrectly uses the attacker-supplied password as the format string. This results in an uncontrolled format string vulnerability (CWE-134), which can be exploited to execute arbitrary code remotely on the controller. The attacker must have authenticated access to the configuration interface, but no user interaction beyond that is required. Exploitation could allow an attacker to gain full control over the wireless controller, potentially leading to compromise of the network infrastructure managed by the device. The vulnerability has a CVSS v3.1 base score of 7.2, reflecting its high impact on confidentiality, integrity, and availability due to remote code execution capabilities. No known exploits are currently reported in the wild, but the vulnerability is publicly disclosed and should be considered a significant risk to affected deployments. No official patches or mitigation links are provided in the data, indicating that organizations must monitor vendor advisories closely for updates or apply workarounds where possible.
Potential Impact
For European organizations, this vulnerability poses a serious risk to the security and stability of their wireless network infrastructure. Ruckus wireless controllers are commonly used in enterprise, education, hospitality, and public sector environments across Europe. Successful exploitation could allow attackers to execute arbitrary code on the controller, leading to unauthorized access to network management functions, interception or manipulation of network traffic, and potential lateral movement within the corporate network. This could result in data breaches, disruption of wireless services, and compromise of sensitive information. Given the authenticated access requirement, insider threats or compromised credentials could be leveraged to exploit this vulnerability. The impact is heightened in critical infrastructure sectors and organizations with large-scale wireless deployments, where network availability and integrity are paramount. Additionally, the vulnerability could be exploited as a foothold for further attacks against European organizations, especially those with strategic importance or handling sensitive data.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Immediately verify if their Ruckus Unleashed or ZoneDirector controllers are running affected versions and prioritize upgrading to the fixed versions once released by CommScope. 2) Restrict access to the administrative interface `/admin/_conf.jsp` by implementing strong network segmentation, limiting management access to trusted IP addresses, and enforcing multi-factor authentication for all administrative accounts. 3) Regularly audit and rotate administrative credentials to reduce the risk of credential compromise. 4) Monitor network and device logs for unusual activity indicative of exploitation attempts, such as unexpected format string anomalies or unauthorized configuration changes. 5) If patches are not yet available, consider temporarily disabling guest Wi-Fi functionality or restricting guest password changes until a fix is applied. 6) Employ intrusion detection/prevention systems capable of detecting format string exploitation patterns targeting these controllers. 7) Maintain an up-to-date asset inventory and vulnerability management process to ensure timely identification and remediation of such vulnerabilities.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium, Poland, Austria
CVE-2025-46123: n/a
Description
An issue was discovered in CommScope Ruckus Unleashed prior to 200.15.6.212.14 and 200.17.7.0.139, and in Ruckus ZoneDirector prior to 10.5.1.0.279, where the authenticated configuration endpoint `/admin/_conf.jsp` writes the Wi-Fi guest password to memory with snprintf using the attacker-supplied value as the format string; a crafted password therefore triggers uncontrolled format-string processing and enables remote code execution on the controller.
AI-Powered Analysis
Technical Analysis
CVE-2025-46123 is a high-severity vulnerability affecting CommScope Ruckus Unleashed wireless controllers prior to versions 200.15.6.212.14 and 200.17.7.0.139, as well as Ruckus ZoneDirector controllers prior to version 10.5.1.0.279. The vulnerability arises from improper handling of the Wi-Fi guest password in the authenticated configuration endpoint `/admin/_conf.jsp`. Specifically, the endpoint uses the C function snprintf to write the guest password to memory, but it incorrectly uses the attacker-supplied password as the format string. This results in an uncontrolled format string vulnerability (CWE-134), which can be exploited to execute arbitrary code remotely on the controller. The attacker must have authenticated access to the configuration interface, but no user interaction beyond that is required. Exploitation could allow an attacker to gain full control over the wireless controller, potentially leading to compromise of the network infrastructure managed by the device. The vulnerability has a CVSS v3.1 base score of 7.2, reflecting its high impact on confidentiality, integrity, and availability due to remote code execution capabilities. No known exploits are currently reported in the wild, but the vulnerability is publicly disclosed and should be considered a significant risk to affected deployments. No official patches or mitigation links are provided in the data, indicating that organizations must monitor vendor advisories closely for updates or apply workarounds where possible.
Potential Impact
For European organizations, this vulnerability poses a serious risk to the security and stability of their wireless network infrastructure. Ruckus wireless controllers are commonly used in enterprise, education, hospitality, and public sector environments across Europe. Successful exploitation could allow attackers to execute arbitrary code on the controller, leading to unauthorized access to network management functions, interception or manipulation of network traffic, and potential lateral movement within the corporate network. This could result in data breaches, disruption of wireless services, and compromise of sensitive information. Given the authenticated access requirement, insider threats or compromised credentials could be leveraged to exploit this vulnerability. The impact is heightened in critical infrastructure sectors and organizations with large-scale wireless deployments, where network availability and integrity are paramount. Additionally, the vulnerability could be exploited as a foothold for further attacks against European organizations, especially those with strategic importance or handling sensitive data.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Immediately verify if their Ruckus Unleashed or ZoneDirector controllers are running affected versions and prioritize upgrading to the fixed versions once released by CommScope. 2) Restrict access to the administrative interface `/admin/_conf.jsp` by implementing strong network segmentation, limiting management access to trusted IP addresses, and enforcing multi-factor authentication for all administrative accounts. 3) Regularly audit and rotate administrative credentials to reduce the risk of credential compromise. 4) Monitor network and device logs for unusual activity indicative of exploitation attempts, such as unexpected format string anomalies or unauthorized configuration changes. 5) If patches are not yet available, consider temporarily disabling guest Wi-Fi functionality or restricting guest password changes until a fix is applied. 6) Employ intrusion detection/prevention systems capable of detecting format string exploitation patterns targeting these controllers. 7) Maintain an up-to-date asset inventory and vulnerability management process to ensure timely identification and remediation of such vulnerabilities.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-04-22T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 687e52aea83201eaac106025
Added to database: 7/21/2025, 2:46:06 PM
Last enriched: 7/29/2025, 1:08:47 AM
Last updated: 8/5/2025, 2:20:27 AM
Views: 10
Related Threats
CVE-2025-9097: Improper Export of Android Application Components in Euro Information CIC banque et compte en ligne App
MediumCVE-2025-9096: Cross Site Scripting in ExpressGateway express-gateway
MediumCVE-2025-9095: Cross Site Scripting in ExpressGateway express-gateway
MediumCVE-2025-7342: CWE-798 Use of Hard-coded Credentials in Kubernetes Image Builder
HighCVE-2025-9094: Improper Neutralization of Special Elements Used in a Template Engine in ThingsBoard
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.