CVE-2025-57602

Insufficient hardening of the proxyuser account in the AiKaan IoT management platform, combined with the use of a shared, hardcoded SSH private key, allows remote attackers to authenticate to the cloud controller, gain interactive shell access, and pivot into other connected IoT devices. This can lead to remote code execution, information disclosure, and privilege escalation across customer environments.
Configurations

No configuration.

History

23 Sep 2025, 19:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
CWE CWE-798
References () https://github.com/Shubhangborkar/aikaan-vulnerabilities/blob/main/cve2-proxyuser-shell.md - () https://github.com/Shubhangborkar/aikaan-vulnerabilities/blob/main/cve2-proxyuser-shell.md -

22 Sep 2025, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-09-22 16:15

Updated : 2025-09-23 19:15


NVD link : CVE-2025-57602

Mitre link : CVE-2025-57602

CVE.ORG link : CVE-2025-57602


JSON object : View

Products Affected

No product.

CWE
CWE-798

Use of Hard-coded Credentials