Published: March 3, 2025
Severity: High (CVSS 7.0)
Impacted Product: Extreme Networks IQ Engine (HiveOS) prior to version 10.7r5
Extreme Networks has released security advisories addressing three critical vulnerabilities in its IQ Engine (HiveOS) product line. These flaws could allow authenticated attackers to execute arbitrary commands, escalate privileges to root, and decrypt user-level passwords on affected systems.
While these vulnerabilities require authenticated access to exploit, they present significant risks to organizations using HiveOS in production environments—especially those with shared credentials or insufficient internal access controls.
In versions prior to 10.7r5, authenticated users can execute arbitrary commands by exploiting the Client-SSID setting through newline injection. Improper input sanitization allows unsanitized commands to be processed, which may lead to full system compromise.
This vulnerability allows authenticated users to decrypt stored user-level passwords through the command-line interface (CLI), exposing sensitive credentials that could be reused elsewhere in the environment.
A flaw in the SSH tunnel feature allows authenticated users to escalate privileges from standard user-level access to root, granting full control over the device through improper handling of SSH tunnel configurations.
Successful exploitation of these vulnerabilities could enable attackers with authenticated access to:
Gradient Cyber strongly recommends the following actions:
These vulnerabilities highlight the importance of securing internal user access—even for authenticated users. Privilege escalation, password exposure, and command injection all provide attackers with dangerous footholds inside the network if left unaddressed.
Gradient Cyber continues to monitor for exploitation trends and will provide updates as further information becomes available.
Gradient Cyber helps organizations detect, prevent, and respond to critical infrastructure vulnerabilities like these. If you need assistance with risk assessment, patch validation, or compromise investigation, our team is ready to help.