Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 23 Oct 2025 10:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Raisecom
Raisecom rax701 |
|
| Vendors & Products |
Raisecom
Raisecom rax701 |
Tue, 21 Oct 2025 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 21 Oct 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 21 Oct 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The affected Raisecom devices allow SSH sessions to be established without completing user authentication. This could allow attackers to gain shell access without valid credentials. | |
| Title | Authentication Bypass Using an Alternate Path or Channel in Raisecomm RAX701-GC Series | |
| Weaknesses | CWE-288 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-10-21T19:39:16.122Z
Reserved: 2025-10-08T20:14:27.225Z
Link: CVE-2025-11534
Updated: 2025-10-21T17:46:23.460Z
Status : Deferred
Published: 2025-10-21T17:15:38.707
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-11534
No data.
OpenCVE Enrichment
Updated: 2025-10-23T10:13:03Z