The affected Raisecom devices allow SSH sessions to be established without completing user authentication. This could allow attackers to gain shell access without valid credentials.
History

Tue, 21 Oct 2025 19:30:00 +0000


Tue, 21 Oct 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 21 Oct 2025 17:15:00 +0000

Type Values Removed Values Added
Description The affected Raisecom devices allow SSH sessions to be established without completing user authentication. This could allow attackers to gain shell access without valid credentials.
Title Authentication Bypass Using an Alternate Path or Channel in Raisecomm RAX701-GC Series
Weaknesses CWE-288
References
Metrics cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-10-21T19:39:16.122Z

Reserved: 2025-10-08T20:14:27.225Z

Link: CVE-2025-11534

cve-icon Vulnrichment

Updated: 2025-10-21T17:46:23.460Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-10-21T17:15:38.707

Modified: 2025-10-21T20:20:25.480

Link: CVE-2025-11534

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.