CVE-2025-30234
Published: 19 March 2025
Description
Adversaries may attempt to position themselves between two or more networked devices using an adversary-in-the-middle (AiTM) technique to support follow-on behaviors such as [Network Sniffing](https://attack.
Security Summary
CVE-2025-30234 is a vulnerability in SmartOS, as used in Triton Data Center and other products, involving static host SSH keys embedded in the 60f76fd2-143f-4f57-819b-1ae32684e81b image—a Debian 12 LX zone image from 2024-07-26. Published on 2025-03-19, it is associated with CWE-321 (Use of Hard-coded Cryptographic Key) and carries a CVSS v3.1 base score of 8.3 (AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H).
An attacker on an adjacent network (AV:A) with no privileges (PR:N) and no user interaction (UI:N) can exploit this high-complexity (AC:H) issue. Exploitation enables high-impact confidentiality, integrity, and availability effects (C:I:A:H) across a changed scope (S:C), potentially allowing unauthorized access or control via the static SSH keys.
Advisories with mitigation guidance include Triton Data Center's TPS-2025-002 at https://security.tritondatacenter.com/tps-2025-002/, a SmartOS discussion thread at https://smartos.topicbox.com/groups/smartos-discuss/Ta6f13072e6bedddc-M3702e993edd7d6ce8d78dfc8, and an oss-security mailing list post at https://www.openwall.com/lists/oss-security/2025/03/13/10.
Details
- CWE(s)
MITRE ATT&CK Enterprise Techniques
Why these techniques?
Hardcoded static SSH host keys in the image enable an attacker on an adjacent network to impersonate the SSH server and perform adversary-in-the-middle attacks (e.g., via traffic redirection), directly facilitating session interception or credential capture due to the known private key.