{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-22T16:18:59.544","vulnerabilities":[{"cve":{"id":"CVE-2025-44963","sourceIdentifier":"cve@mitre.org","published":"2025-08-04T17:15:30.540","lastModified":"2025-11-03T20:19:04.530","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"RUCKUS Network Director (RND) before 4.5 allows spoofing of an administrator JWT by an attacker who knows the hardcoded value of a certain secret key."},{"lang":"es","value":"RUCKUS Network Director (RND) anterior a la versión 4.5 permite la suplantación de un JWT de administrador por parte de un atacante que conoce el valor codificado de una determinada clave secreta."}],"metrics":{"cvssMetricV31":[{"source":"cve@mitre.org","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H","baseScore":9.0,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.2,"impactScore":6.0},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":8.1,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.2,"impactScore":5.9}]},"weaknesses":[{"source":"cve@mitre.org","type":"Secondary","description":[{"lang":"en","value":"CWE-321"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:commscope:ruckus_network_director:*:*:*:*:*:*:*:*","versionEndExcluding":"4.5.0.0","matchCriteriaId":"ECB923DF-F0BF-40F6-87D9-6FDA957F9134"}]}]}],"references":[{"url":"https://claroty.com/team82/disclosure-dashboard/cve-2025-44963","source":"cve@mitre.org","tags":["Third Party Advisory"]},{"url":"https://kb.cert.org/vuls/id/613753","source":"cve@mitre.org","tags":["Third Party Advisory"]},{"url":"https://webresources.commscope.com/download/assets/FAQ+Security+Advisory%3A+ID+20250710/225f44ac3bd311f095821adcaa92e24e","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"https://www.kb.cert.org/vuls/id/613753","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}