
Sign up to save your podcasts
Or
This week on IT SPARC Cast – CVE of the Week, John and Lou dive into one of the most critical vulnerabilities to ever hit enterprise wireless networks: CVE-2025-44957 and a cluster of related flaws targeting Ruckus Wireless’s Virtual SmartZone (VSZ) and Ruckus Network Director (RND). These platforms, which manage massive deployments of up to 10,000 access points, contain hardcoded secrets, default RSA keys, unauthenticated RCE flaws, and directory traversal exploits—all scoring up to CVSS 10.0.
With no patch currently available and Ruckus/CommScope silent, these vulnerabilities present a hair-on-fire moment for network administrators. The team breaks down what went wrong, what to do now, and why silence from the vendor is the worst possible response. If you’re running Ruckus infrastructure—or connecting to a network that is—you need to listen to this episode immediately.
⸻
Stay Connected with Us
IT SPARC Cast
🔗 @ITSPARCCast on X
🔗 SPARC Sales on LinkedIn
John Barger
🔗 @john_Video on X
🔗 John on LinkedIn
Lou Schmidt
🔗 @loudoggeek on X
🔗 Lou on LinkedIn
⸻
🔐 SEO Keywords: Ruckus CVE-2025-44954, CVE-2025-44955, CVE-2025-44957, CVE-2025-44958, CVE-2025-44960, CVE-2025-44961, CVE-2025-44962, CVE‑2025‑6243, CVE‑2025‑4496, Ruckus vulnerabilities 2025, hardcoded backdoor Ruckus, CVSS 10.0 wireless flaw, Ruckus Virtual SmartZone exploit, Commscope network security breach, enterprise WiFi security alert, zero-day in Ruckus management systems, IT SPARC Cast security podcast.
Hosted on Acast. See acast.com/privacy for more information.
This week on IT SPARC Cast – CVE of the Week, John and Lou dive into one of the most critical vulnerabilities to ever hit enterprise wireless networks: CVE-2025-44957 and a cluster of related flaws targeting Ruckus Wireless’s Virtual SmartZone (VSZ) and Ruckus Network Director (RND). These platforms, which manage massive deployments of up to 10,000 access points, contain hardcoded secrets, default RSA keys, unauthenticated RCE flaws, and directory traversal exploits—all scoring up to CVSS 10.0.
With no patch currently available and Ruckus/CommScope silent, these vulnerabilities present a hair-on-fire moment for network administrators. The team breaks down what went wrong, what to do now, and why silence from the vendor is the worst possible response. If you’re running Ruckus infrastructure—or connecting to a network that is—you need to listen to this episode immediately.
⸻
Stay Connected with Us
IT SPARC Cast
🔗 @ITSPARCCast on X
🔗 SPARC Sales on LinkedIn
John Barger
🔗 @john_Video on X
🔗 John on LinkedIn
Lou Schmidt
🔗 @loudoggeek on X
🔗 Lou on LinkedIn
⸻
🔐 SEO Keywords: Ruckus CVE-2025-44954, CVE-2025-44955, CVE-2025-44957, CVE-2025-44958, CVE-2025-44960, CVE-2025-44961, CVE-2025-44962, CVE‑2025‑6243, CVE‑2025‑4496, Ruckus vulnerabilities 2025, hardcoded backdoor Ruckus, CVSS 10.0 wireless flaw, Ruckus Virtual SmartZone exploit, Commscope network security breach, enterprise WiFi security alert, zero-day in Ruckus management systems, IT SPARC Cast security podcast.
Hosted on Acast. See acast.com/privacy for more information.