Home

Description

Insufficient hardening of the proxyuser account in the AiKaan IoT management platform, combined with the use of a shared, hardcoded SSH private key, allows remote attackers to authenticate to the cloud controller, gain interactive shell access, and pivot into other connected IoT devices. This can lead to remote code execution, information disclosure, and privilege escalation across customer environments.

PUBLISHED Reserved 2025-08-17 | Published 2025-09-22 | Updated 2025-09-23 | Assigner mitre

References

github.com/...nerabilities/blob/main/cve2-proxyuser-shell.md exploit

github.com/...nerabilities/blob/main/cve2-proxyuser-shell.md

cve.org (CVE-2025-57602)

nvd.nist.gov (CVE-2025-57602)

Download JSON