Cyber Posture

CVE-2025-30234

High

Published: 19 March 2025

Published
19 March 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 8.3 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
EPSS Score 0.0013 31.3th percentile
Risk Priority 17 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may attempt to position themselves between two or more networked devices using an adversary-in-the-middle (AiTM) technique to support follow-on behaviors such as [Network Sniffing](https://attack.

Security Summary

CVE-2025-30234 is a vulnerability in SmartOS, as used in Triton Data Center and other products, involving static host SSH keys embedded in the 60f76fd2-143f-4f57-819b-1ae32684e81b image—a Debian 12 LX zone image from 2024-07-26. Published on 2025-03-19, it is associated with CWE-321 (Use of Hard-coded Cryptographic Key) and carries a CVSS v3.1 base score of 8.3 (AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H).

An attacker on an adjacent network (AV:A) with no privileges (PR:N) and no user interaction (UI:N) can exploit this high-complexity (AC:H) issue. Exploitation enables high-impact confidentiality, integrity, and availability effects (C:I:A:H) across a changed scope (S:C), potentially allowing unauthorized access or control via the static SSH keys.

Advisories with mitigation guidance include Triton Data Center's TPS-2025-002 at https://security.tritondatacenter.com/tps-2025-002/, a SmartOS discussion thread at https://smartos.topicbox.com/groups/smartos-discuss/Ta6f13072e6bedddc-M3702e993edd7d6ce8d78dfc8, and an oss-security mailing list post at https://www.openwall.com/lists/oss-security/2025/03/13/10.

Details

CWE(s)
CWE-321

MITRE ATT&CK Enterprise Techniques

T1557 Adversary-in-the-Middle Credential Access
Adversaries may attempt to position themselves between two or more networked devices using an adversary-in-the-middle (AiTM) technique to support follow-on behaviors such as [Network Sniffing](https://attack.
Why these techniques?

Hardcoded static SSH host keys in the image enable an attacker on an adjacent network to impersonate the SSH server and perform adversary-in-the-middle attacks (e.g., via traffic redirection), directly facilitating session interception or credential capture due to the known private key.

Confidence: MEDIUM · MITRE ATT&CK Enterprise v19.0

References