Vulnerabilites related to Brocade Communications Systems, Inc. - Zone Director Controller and Unleashed AP Firmware
CVE-2017-6224 (GCVE-0-2017-6224)
Vulnerability from cvelistv5
Published
2017-10-13 17:00
Modified
2024-09-16 18:34
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Authenticated Root Command Injection.
Summary
Ruckus Wireless Zone Director Controller firmware releases ZD9.x, ZD10.0.0.x, ZD10.0.1.x (less than 10.0.1.0.17 MR1 release) and Ruckus Wireless Unleashed AP Firmware releases 200.0.x, 200.1.x, 200.2.x, 200.3.x, 200.4.x. contain OS Command Injection vulnerabilities that could allow local authenticated users to execute arbitrary privileged commands on the underlying operating system by appending those commands in the Common Name field in the Certificate Generation Request.
References
▼ | URL | Tags |
---|---|---|
https://ruckus-www.s3.amazonaws.com/pdf/security/faq-security-advisory-id-092917.txt | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Brocade Communications Systems, Inc. | Zone Director Controller and Unleashed AP Firmware |
Version: ZD9.x Version: ZD10.0.0.x Version: ZD10.0.1.x Version: 200.x Version: 200.2.x Version: 200.3.x Version: 200.4.x |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T15:25:49.092Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://ruckus-www.s3.amazonaws.com/pdf/security/faq-security-advisory-id-092917.txt" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Zone Director Controller and Unleashed AP Firmware", "vendor": "Brocade Communications Systems, Inc.", "versions": [ { "status": "affected", "version": "ZD9.x" }, { "status": "affected", "version": "ZD10.0.0.x" }, { "status": "affected", "version": "ZD10.0.1.x" }, { "status": "affected", "version": "200.x" }, { "status": "affected", "version": "200.2.x" }, { "status": "affected", "version": "200.3.x" }, { "status": "affected", "version": "200.4.x" } ] } ], "datePublic": "2017-09-27T00:00:00", "descriptions": [ { "lang": "en", "value": "Ruckus Wireless Zone Director Controller firmware releases ZD9.x, ZD10.0.0.x, ZD10.0.1.x (less than 10.0.1.0.17 MR1 release) and Ruckus Wireless Unleashed AP Firmware releases 200.0.x, 200.1.x, 200.2.x, 200.3.x, 200.4.x. contain OS Command Injection vulnerabilities that could allow local authenticated users to execute arbitrary privileged commands on the underlying operating system by appending those commands in the Common Name field in the Certificate Generation Request." } ], "problemTypes": [ { "descriptions": [ { "description": "Authenticated Root Command Injection.", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-13T16:57:01", "orgId": "87b297d7-335e-4844-9551-11b97995a791", "shortName": "brocade" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://ruckus-www.s3.amazonaws.com/pdf/security/faq-security-advisory-id-092917.txt" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "sirt@brocade.com", "DATE_PUBLIC": "2017-09-27T00:00:00", "ID": "CVE-2017-6224", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Zone Director Controller and Unleashed AP Firmware", "version": { "version_data": [ { "version_value": "ZD9.x" }, { "version_value": "ZD10.0.0.x" }, { "version_value": "ZD10.0.1.x" }, { "version_value": "200.x" }, { "version_value": "200.2.x" }, { "version_value": "200.3.x" }, { "version_value": "200.4.x" } ] } } ] }, "vendor_name": "Brocade Communications Systems, Inc." } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Ruckus Wireless Zone Director Controller firmware releases ZD9.x, ZD10.0.0.x, ZD10.0.1.x (less than 10.0.1.0.17 MR1 release) and Ruckus Wireless Unleashed AP Firmware releases 200.0.x, 200.1.x, 200.2.x, 200.3.x, 200.4.x. contain OS Command Injection vulnerabilities that could allow local authenticated users to execute arbitrary privileged commands on the underlying operating system by appending those commands in the Common Name field in the Certificate Generation Request." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Authenticated Root Command Injection." } ] } ] }, "references": { "reference_data": [ { "name": "https://ruckus-www.s3.amazonaws.com/pdf/security/faq-security-advisory-id-092917.txt", "refsource": "CONFIRM", "url": "https://ruckus-www.s3.amazonaws.com/pdf/security/faq-security-advisory-id-092917.txt" } ] } } } }, "cveMetadata": { "assignerOrgId": "87b297d7-335e-4844-9551-11b97995a791", "assignerShortName": "brocade", "cveId": "CVE-2017-6224", "datePublished": "2017-10-13T17:00:00Z", "dateReserved": "2017-02-23T00:00:00", "dateUpdated": "2024-09-16T18:34:15.776Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }