In Ruckus Network Director (RND) < 4.5.0.54, the OVA appliance contains hardcoded credentials for the ruckus PostgreSQL database user. In the default configuration, the PostgreSQL service is accessible over the network on TCP port 5432. An attacker can use the hardcoded credentials to authenticate remotely, gaining superuser access to the database. This allows creation of administrative users for the web interface, extraction of password hashes, and execution of arbitrary OS commands.
History

Thu, 19 Feb 2026 20:15:00 +0000

Type Values Removed Values Added
Description In Ruckus Network Director (RND) < 4.5.0.54, the OVA appliance contains hardcoded credentials for the ruckus PostgreSQL database user. In the default configuration, the PostgreSQL service is accessible over the network on TCP port 5432. An attacker can use the hardcoded credentials to authenticate remotely, gaining superuser access to the database. This allows creation of administrative users for the web interface, extraction of password hashes, and execution of arbitrary OS commands.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2026-02-19T00:00:00.000Z

Updated: 2026-02-19T19:51:31.678Z

Reserved: 2025-12-08T00:00:00.000Z

Link: CVE-2025-67304

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-02-19T20:25:24.373

Modified: 2026-02-19T20:25:24.373

Link: CVE-2025-67304

cve-icon Redhat

No data.