Insufficient hardening of the proxyuser account in the AiKaan IoT management platform, combined with the use of a shared, hardcoded SSH private key, allows remote attackers to authenticate to the cloud controller, gain interactive shell access, and pivot into other connected IoT devices. This can lead to remote code execution, information disclosure, and privilege escalation across customer environments.
References
Configurations
No configuration.
History
23 Sep 2025, 19:15
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
CWE | CWE-798 | |
References | () https://github.com/Shubhangborkar/aikaan-vulnerabilities/blob/main/cve2-proxyuser-shell.md - |
22 Sep 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-09-22 16:15
Updated : 2025-09-23 19:15
NVD link : CVE-2025-57602
Mitre link : CVE-2025-57602
CVE.ORG link : CVE-2025-57602
JSON object : View
Products Affected
No product.
CWE
CWE-798
Use of Hard-coded Credentials