In Ruckus Network Director (RND) < 4.5.0.54, the OVA appliance contains hardcoded credentials for the ruckus PostgreSQL database user. In the default configuration, the PostgreSQL service is accessible over the network on TCP port 5432. An attacker can use the hardcoded credentials to authenticate remotely, gaining superuser access to the database. This allows creation of administrative users for the web interface, extraction of password hashes, and execution of arbitrary OS commands.
Metrics
Affected Vendors & Products
References
History
Mon, 23 Feb 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 23 Feb 2026 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-798 | |
| Metrics |
cvssV3_1
|
Fri, 20 Feb 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Commscope
Commscope ruckus Network Director |
|
| Vendors & Products |
Commscope
Commscope ruckus Network Director |
Thu, 19 Feb 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In Ruckus Network Director (RND) < 4.5.0.54, the OVA appliance contains hardcoded credentials for the ruckus PostgreSQL database user. In the default configuration, the PostgreSQL service is accessible over the network on TCP port 5432. An attacker can use the hardcoded credentials to authenticate remotely, gaining superuser access to the database. This allows creation of administrative users for the web interface, extraction of password hashes, and execution of arbitrary OS commands. | |
| References |
|
|
Status: PUBLISHED
Assigner: mitre
Published: 2026-02-19T00:00:00.000Z
Updated: 2026-02-23T14:03:21.884Z
Reserved: 2025-12-08T00:00:00.000Z
Link: CVE-2025-67304
Updated: 2026-02-23T14:02:04.584Z
Status : Awaiting Analysis
Published: 2026-02-19T20:25:24.373
Modified: 2026-02-23T14:16:20.680
Link: CVE-2025-67304
No data.