SSH Authentication Bypass Vulnerability in Raisecom Devices
CVE-2025-11534
9.3CRITICAL
What is CVE-2025-11534?
Raisecom devices exhibit a significant vulnerability that permits the establishment of SSH sessions without proper user authentication. This critical flaw enables unauthorized attackers to potentially access the system's shell without the need for valid credentials, posing serious security risks. Organizations utilizing these devices are strongly advised to evaluate their security postures and implement necessary mitigating measures.
Affected Version(s)
RAX701-GC-WP-01 P200R002C52 Firmware version 5.5.27_20190111
RAX701-GC-WP-01 P200R002C53 Firmware version 5.5.13_20180720
RAX701-GC-WP-01 P200R002C53 Firmware version 5.5.36_20190709
References
CVSS V4
Score:
9.3
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None
Timeline
Vulnerability published
Vulnerability Reserved
Credit
HD Moore of runZero discovered this vulnerability and Tod Beardsley of runZero reported this vulnerability to CISA.