{"id":77584,"date":"2025-09-27T00:30:49","date_gmt":"2025-09-27T00:30:49","guid":{"rendered":""},"modified":"2025-10-21T04:49:50","modified_gmt":"2025-10-21T10:49:50","slug":"cve-2025-57601-critical-aikaan-cloud-controller-ssh-private-key-vulnerability","status":"publish","type":"post","link":"https:\/\/www.ameeba.com\/blog\/cve-2025-57601-critical-aikaan-cloud-controller-ssh-private-key-vulnerability\/","title":{"rendered":"<strong>CVE-2025-57601: Critical AiKaan Cloud Controller SSH Private Key Vulnerability<\/strong>"},"content":{"rendered":"<p><strong>Overview<\/strong><\/p>\n<p>In this blog post, we will be discussing a critical security flaw identified in AiKaan Cloud Controller&#8217;s approach to remote terminal access on managed Internet of Things (IoT) and edge devices. This vulnerability, designated as CVE-2025-57601, poses a serious threat to organizations and individuals relying on this system for their IoT or edge device management. The flaw lies in the reuse of a single hardcoded SSH private key and the username `proxyuser` across all customer environments, which <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-9364-critical-open-database-issue-resulting-in-potential-system-compromise\/\"  data-wpil-monitor-id=\"89051\">opens up a potential<\/a> avenue for attackers to impersonate any managed device and interact with devices without the owner&#8217;s consent.<\/p>\n<p><strong>Vulnerability Summary<\/strong><\/p>\n<p>CVE ID: CVE-2025-57601<br \/>\nSeverity: Critical (9.8)<br \/>\nAttack Vector: Network<br \/>\nPrivileges Required: Low<br \/>\nUser Interaction: None<br \/>\nImpact: <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-9791-critical-vulnerability-in-tenda-ac20-16-03-08-05-leading-to-potential-system-compromise\/\"  data-wpil-monitor-id=\"85062\">Potential system<\/a> compromise or data leakage<\/p>\n<p><strong>Affected Products<\/strong><\/p><div id=\"ameeb-1192295433\" class=\"ameeb-content-2 ameeb-entity-placement\"><div style=\"border-left: 4px solid #555; padding-left: 20px; margin: 48px 0; font-family: Roboto, sans-serif; color: #ffffff; line-height: 1.6; max-width: 700px;\">\r\n  <h2 style=\"margin-top: 0; font-size: 20px; font-weight: 600; display: flex; align-items: center;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"display: inline-flex; align-items: center; margin-right: 8px;\">\r\n      <img decoding=\"async\" src=\"https:\/\/www.ameeba.com\/blog\/wp-content\/uploads\/2025\/10\/Best-App-icon-Ameeba.png\" alt=\"Ameeba Chat Icon\" style=\"width: 40px; height: 40px;\" \/>\r\n    <\/a>\r\n    A new way to communicate\r\n  <\/h2>\r\n\r\n  <p style=\"margin-bottom: 12px;\">\r\n    Ameeba Chat is built on encrypted identity, not personal profiles.\r\n  <\/p>\r\n\r\n  <p style=\"margin-bottom: 16px;\">\r\n    Message, call, share files, and coordinate with identities kept separate.\r\n  <\/p>\r\n\r\n  <ul style=\"list-style: none; padding-left: 0; margin-bottom: 20px;\">\r\n    <li>\u2022 Encrypted identity<\/li>\r\n    <li>\u2022 Ameeba Chat authenticates access<\/li>\r\n    <li>\u2022 Aliases and categories<\/li>\r\n    <li>\u2022 End-to-end encrypted chat, calls, and files<\/li>\r\n    <li>\u2022 Secure notes for sensitive information<\/li>\r\n  <\/ul>\r\n\r\n  <p style=\"font-style: italic; font-weight: 600; margin-bottom: 24px;\">\r\n    Private communication, rethought.\r\n  <\/p>\r\n\r\n  <div style=\"display: flex; flex-wrap: wrap; gap: 12px;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\/download\" style=\"background-color: #ffffff; color: #000000; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Download Ameeba Chat<\/a>\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"border: 1px solid #ffffff; color: #ffffff; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Learn More<\/a>\r\n  <\/div>\r\n<\/div>\r\n<\/div>\n<p>Product | Affected Versions<\/p>\n<p>AiKaan Cloud <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-28041-access-control-vulnerability-in-itranswarp-up-to-version-2-19\/\"  data-wpil-monitor-id=\"85992\">Controller | All versions<\/a> prior to patch<\/p>\n<p><strong>How the Exploit Works<\/strong><\/p>\n<p>The vulnerability stems from the reuse of the same hardcoded <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-53584-critical-deserialization-of-untrusted-data-vulnerability-in-wp-ticket-customer-service-software\/\"  data-wpil-monitor-id=\"85881\">SSH private key<\/a> and username across all customer environments. Whenever an administrator initiates &#8220;Open Remote Terminal&#8221; from the AiKaan dashboard, the controller sends the same static private key to the target device. An attacker who manages to obtain this key can impersonate any managed device and establish unauthorized reverse SSH tunnels. This compromises the trust boundary between the controller and devices.<\/p>\n<p><strong>Conceptual Example Code<\/strong><\/p><div id=\"ameeb-599926460\" class=\"ameeb-content ameeb-entity-placement\"><div class=\"poptin-embedded\" data-id=\"f6b387694f681\"><\/div>\r\n\r\n\r\n\r\n\r\n\r\n<\/div>\n<p>Given the nature of the vulnerability, a direct <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-5039-critical-vulnerability-in-autodesk-applications-leading-to-arbitrary-code-execution\/\"  data-wpil-monitor-id=\"90531\">code example may not be applicable<\/a>. However, an attacker who has obtained the SSH private key could establish an unauthorized connection like this:<\/p>\n<pre><code class=\"\" data-line=\"\">ssh -i compromised_key.pem proxyuser@target_device_ip<\/code><\/pre>\n<p>In this example, `compromised_key.pem` is the obtained SSH private key and `target_device_ip` is the IP address of the target IoT or edge device.<\/p>\n<p><strong>Recommendations<\/strong><\/p>\n<p>To mitigate this vulnerability, it is strongly recommended to apply the vendor patch as soon as it becomes available. If the patch is not immediately available, using a Web Application Firewall (WAF) or an Intrusion Detection System (IDS) can serve as a temporary mitigation measure. Long-term, the vendor should consider revising their authentication model to ensure unique, <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-52159-hardcoded-credentials-compromise-security-in-ppress-0-0-9\/\"  data-wpil-monitor-id=\"90645\">secure credentials<\/a> for each customer environment.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Overview In this blog post, we will be discussing a critical security flaw identified in AiKaan Cloud Controller&#8217;s approach to remote terminal access on managed Internet of Things (IoT) and edge devices. This vulnerability, designated as CVE-2025-57601, poses a serious threat to organizations and individuals relying on this system for their IoT or edge device [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"footnotes":""},"categories":[1],"tags":[],"vendor":[82],"product":[],"attack_vector":[],"asset_type":[],"severity":[],"exploit_status":[],"class_list":["post-77584","post","type-post","status-publish","format-standard","hentry","category-uncategorized","vendor-microsoft"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/77584","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/comments?post=77584"}],"version-history":[{"count":6,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/77584\/revisions"}],"predecessor-version":[{"id":83590,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/77584\/revisions\/83590"}],"wp:attachment":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/media?parent=77584"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/categories?post=77584"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/tags?post=77584"},{"taxonomy":"vendor","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/vendor?post=77584"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/product?post=77584"},{"taxonomy":"attack_vector","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/attack_vector?post=77584"},{"taxonomy":"asset_type","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/asset_type?post=77584"},{"taxonomy":"severity","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/severity?post=77584"},{"taxonomy":"exploit_status","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/exploit_status?post=77584"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}