Remote Authentication Bypass in Ruijie RG-ES Series Switch Firmware
CVE-2025-56752

9.4CRITICAL

Key Information:

Vendor

Ruijie

Vendor
CVE Published:
3 September 2025

What is CVE-2025-56752?

CVE-2025-56752 is a significant vulnerability affecting the Ruijie RG-ES series switch firmware, specifically version ESW_1.0(1)B1P39. This vulnerability enables remote attackers to bypass authentication mechanisms entirely through the exploitation of a crafted HTTP POST request. As a result, attackers can gain unrestricted access to the device, allowing them to alter administrative settings and potentially gain full control over the affected devices. This unauthorized access can critically undermine the integrity and security of network operations within an organization, making it easier for intruders to manipulate sensitive configurations, access confidential data, or disrupt network services.

Potential impact of CVE-2025-56752

  1. Unauthorized Access to Network Devices: The ability to bypass authentication can lead to unauthorized individuals gaining full control of network switches. This may facilitate a range of nefarious activities, including manipulation of network traffic, theft of sensitive information, or installation of malicious software.

  2. Disruption of Network Services: With unrestricted administrative access granted through this vulnerability, attackers could alter critical settings of the network switches, resulting in service disruptions, downtime, or degraded performance for organizational operations.

  3. Compromise of Entire Network Infrastructure: As the switches often serve as vital points within a network, their compromise can lead to a domino effect, allowing attackers to pivot to other systems within the network, furthering their intrusion and potentially compromising a broader range of sensitive and critical infrastructures.

References

CVSS V3.1

Score:
9.4
Severity:
CRITICAL
Confidentiality:
High
Integrity:
Low
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.