SSH Authentication Bypass Vulnerability in Raisecom Devices
CVE-2025-11534

9.3CRITICAL

Key Information:

Vendor

Raisecomm

Vendor
CVE Published:
21 October 2025

What is CVE-2025-11534?

Raisecom devices exhibit a significant vulnerability that permits the establishment of SSH sessions without proper user authentication. This critical flaw enables unauthorized attackers to potentially access the system's shell without the need for valid credentials, posing serious security risks. Organizations utilizing these devices are strongly advised to evaluate their security postures and implement necessary mitigating measures.

Affected Version(s)

RAX701-GC-WP-01 P200R002C52 Firmware version 5.5.27_20190111

RAX701-GC-WP-01 P200R002C53 Firmware version 5.5.13_20180720

RAX701-GC-WP-01 P200R002C53 Firmware version 5.5.36_20190709

References

CVSS V4

Score:
9.3
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

HD Moore of runZero discovered this vulnerability and Tod Beardsley of runZero reported this vulnerability to CISA.
.
CVE-2025-11534 : SSH Authentication Bypass Vulnerability in Raisecom Devices