Vulnerabilites related to ruckuswireless - r310_firmware
Vulnerability from fkie_nvd
Published
2023-01-20 19:15
Modified
2025-04-03 18:15
Severity ?
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
In Ruckus R310 10.5.1.0.199, Ruckus R500 10.5.1.0.199, Ruckus R600 10.5.1.0.199, Ruckus T300 10.5.1.0.199, Ruckus T301n 10.5.1.0.199, Ruckus T301s 10.5.1.0.199, SmartCell Gateway 200 (SCG200) before 3.6.2.0.795, SmartZone 100 (SZ-100) before 3.6.2.0.795, SmartZone 300 (SZ300) before 3.6.2.0.795, Virtual SmartZone (vSZ) before 3.6.2.0.795, ZoneDirector 1100 9.10.2.0.130, ZoneDirector 1200 10.2.1.0.218, ZoneDirector 3000 10.2.1.0.218, ZoneDirector 5000 10.0.1.0.151, a vulnerability allows attackers to exploit the official image signature to force injection unauthorized image signature.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ruckuswireless | r310_firmware | 10.5.1.0.199 | |
ruckuswireless | r310 | - | |
ruckuswireless | r500_firmware | 10.5.1.0.199 | |
ruckuswireless | r500 | - | |
ruckuswireless | r600_firmware | 10.5.1.0.199 | |
ruckuswireless | r600 | - | |
ruckuswireless | t300_firmware | 10.5.1.0.199 | |
ruckuswireless | t300 | - | |
ruckuswireless | t301n_firmware | 10.5.1.0.199 | |
ruckuswireless | t301n | - | |
ruckuswireless | t301s_firmware | 10.5.1.0.199 | |
ruckuswireless | t301s | - | |
ruckuswireless | scg200_firmware | * | |
ruckuswireless | scg200 | - | |
ruckuswireless | sz-100_firmware | * | |
ruckuswireless | sz-100 | - | |
ruckuswireless | sz-300_firmware | * | |
ruckuswireless | sz-300 | - | |
ruckuswireless | vsz_firmware | * | |
ruckuswireless | vsz | - | |
ruckuswireless | zonedirector_1100_firmware | 9.10.2.0.130 | |
ruckuswireless | zonedirector_1100 | - | |
ruckuswireless | zonedirector_1200_firmware | 10.2.1.0.218 | |
ruckuswireless | zonedirector_1200 | - | |
ruckuswireless | zonedirector_3000_firmware | 10.2.1.0.218 | |
ruckuswireless | zonedirector_3000 | - | |
ruckuswireless | zonedirector_5000_firmware | 10.0.1.0.151 | |
ruckuswireless | zonedirector_5000 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:r310_firmware:10.5.1.0.199:*:*:*:*:*:*:*", "matchCriteriaId": "5ED8801F-2B0B-480D-876D-9F662B995851", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:r310:-:*:*:*:*:*:*:*", "matchCriteriaId": "40D3129E-4C02-484F-96B6-59D76F787D21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:r500_firmware:10.5.1.0.199:*:*:*:*:*:*:*", "matchCriteriaId": "E54CB15F-CA79-403B-A1B1-B7832B65EEC3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:r500:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BBDBE9C-BE4B-4ED6-AF62-8FE484C519E2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:r600_firmware:10.5.1.0.199:*:*:*:*:*:*:*", "matchCriteriaId": "27E05347-1CFD-46FC-999A-90E6C40CEE26", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:r600:-:*:*:*:*:*:*:*", "matchCriteriaId": "5421B1D7-E630-4BDA-BA34-7DD8D0738DF4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:t300_firmware:10.5.1.0.199:*:*:*:*:*:*:*", "matchCriteriaId": "5D91278C-B07E-44FF-ABBA-10E8B5830FFA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:t300:-:*:*:*:*:*:*:*", "matchCriteriaId": "0511674E-59A6-427C-A265-B277D84DE301", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:t301n_firmware:10.5.1.0.199:*:*:*:*:*:*:*", "matchCriteriaId": "E0412E29-6DB5-4C01-B8C3-702EB7EBE8DE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:t301n:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBB7A43E-F5F1-465A-841F-05214EDA6833", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:t301s_firmware:10.5.1.0.199:*:*:*:*:*:*:*", "matchCriteriaId": "6DAA3771-2795-403D-8506-C155403C8B7C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:t301s:-:*:*:*:*:*:*:*", "matchCriteriaId": "68C4D9AC-5B1C-4066-8216-3F7127C3CC64", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:scg200_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "775F1067-344F-49AD-9901-97D2F1AC5F0F", "versionEndExcluding": "3.6.2.0.795", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:scg200:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6FB3968-8D8A-4D04-B3D1-18A28CA8C249", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:sz-100_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "46BCF71C-8A66-45C8-B1ED-8957B670CBF5", "versionEndExcluding": "3.6.2.0.795", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:sz-100:-:*:*:*:*:*:*:*", "matchCriteriaId": "3B9F3E41-79CA-45B7-B799-B0A64E60BA16", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:sz-300_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7CEA2295-79BE-4728-8BF2-DEAB2BCAA0E5", "versionEndExcluding": "3.6.2.0.795", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:sz-300:-:*:*:*:*:*:*:*", "matchCriteriaId": "4087D2FB-0853-40AE-A03F-803B5972A404", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:vsz_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B3E5690D-7955-4E12-AE51-C3CDAD596096", "versionEndExcluding": "3.6.2.0.795", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:vsz:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1E9A46B-D8E4-489A-8648-28EDDF000E28", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:zonedirector_1100_firmware:9.10.2.0.130:*:*:*:*:*:*:*", "matchCriteriaId": "76872953-AA21-41F1-832E-5CD04CA0FF9A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:zonedirector_1100:-:*:*:*:*:*:*:*", "matchCriteriaId": "CF376AF6-E73A-425B-8E31-36330D8FEB73", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:zonedirector_1200_firmware:10.2.1.0.218:*:*:*:*:*:*:*", "matchCriteriaId": "83AD20A3-C56E-4436-A9CC-29884EF9EB67", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:zonedirector_1200:-:*:*:*:*:*:*:*", "matchCriteriaId": "0FE0C2B2-D14B-4798-95C4-F911B3B1D88E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:zonedirector_3000_firmware:10.2.1.0.218:*:*:*:*:*:*:*", "matchCriteriaId": "86A26EBE-4077-4DE7-BC6C-D38F5A3D3E7B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:zonedirector_3000:-:*:*:*:*:*:*:*", "matchCriteriaId": "5A1F42A8-8785-48A5-B0B0-68504EFD38B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:zonedirector_5000_firmware:10.0.1.0.151:*:*:*:*:*:*:*", "matchCriteriaId": "04D53E59-6431-4ED3-BA0B-E54B2FBCDE0D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:zonedirector_5000:-:*:*:*:*:*:*:*", "matchCriteriaId": "1DA49DE5-DA7F-4531-9ACF-353561DA90E4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Ruckus R310 10.5.1.0.199, Ruckus R500 10.5.1.0.199, Ruckus R600 10.5.1.0.199, Ruckus T300 10.5.1.0.199, Ruckus T301n 10.5.1.0.199, Ruckus T301s 10.5.1.0.199, SmartCell Gateway 200 (SCG200) before 3.6.2.0.795, SmartZone 100 (SZ-100) before 3.6.2.0.795, SmartZone 300 (SZ300) before 3.6.2.0.795, Virtual SmartZone (vSZ) before 3.6.2.0.795, ZoneDirector 1100 9.10.2.0.130, ZoneDirector 1200 10.2.1.0.218, ZoneDirector 3000 10.2.1.0.218, ZoneDirector 5000 10.0.1.0.151, a vulnerability allows attackers to exploit the official image signature to force injection unauthorized image signature." }, { "lang": "es", "value": "En Ruckus R310 10.5.1.0.199, Ruckus R500 10.5.1.0.199, Ruckus R600 10.5.1.0.199, Ruckus T300 10.5.1.0.199, Ruckus T301n 10.5.1.0.199, Ruckus T301s 10.5.1.0 .199, celda inteligente Gateway 200 (SCG200) anterior a 3.6.2.0.795, SmartZone 100 (SZ-100) anterior a 3.6.2.0.795, SmartZone 300 (SZ300) anterior a 3.6.2.0.795, Virtual SmartZone (vSZ) anterior a 3.6.2.0.795, ZoneDirector 1100 9.10.2.0.130, ZoneDirector 1200 10.2.1.0.218, ZoneDirector 3000 10.2.1.0.218, ZoneDirector 5000 10.0.1.0.151, una vulnerabilidad permite a los atacantes explotar la firma de la imagen oficial para forzar la inyecci\u00f3n de una firma de imagen no autorizada." } ], "id": "CVE-2020-22653", "lastModified": "2025-04-03T18:15:38.367", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2023-01-20T19:15:12.547", "references": [ { "source": "cve@mitre.org", "url": "https://hdhrmi.blogspot.com/2020/03/multiple-vulnerabilities-in-ruckus.html?m=1" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://support.ruckuswireless.com/security_bulletins/302" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://support.ruckuswireless.com/security_bulletins/302" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-347" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2023-01-20 19:15
Modified
2025-04-03 21:15
Severity ?
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
In Ruckus R310 10.5.1.0.199, Ruckus R500 10.5.1.0.199, Ruckus R600 10.5.1.0.199, Ruckus T300 10.5.1.0.199, Ruckus T301n 10.5.1.0.199, Ruckus T301s 10.5.1.0.199, SmartCell Gateway 200 (SCG200) before 3.6.2.0.795, SmartZone 100 (SZ-100) before 3.6.2.0.795, SmartZone 300 (SZ300) before 3.6.2.0.795, Virtual SmartZone (vSZ) before 3.6.2.0.795, ZoneDirector 1100 9.10.2.0.130, ZoneDirector 1200 10.2.1.0.218, ZoneDirector 3000 10.2.1.0.218, ZoneDirector 5000 10.0.1.0.151, a vulnerability allows attackers to switch completely to unauthorized image to be Boot as primary verified image.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ruckuswireless | r310_firmware | 10.5.1.0.199 | |
ruckuswireless | r310 | - | |
ruckuswireless | r500_firmware | 10.5.1.0.199 | |
ruckuswireless | r500 | - | |
ruckuswireless | r600_firmware | 10.5.1.0.199 | |
ruckuswireless | r600 | - | |
ruckuswireless | t300_firmware | 10.5.1.0.199 | |
ruckuswireless | t300 | - | |
ruckuswireless | t301n_firmware | 10.5.1.0.199 | |
ruckuswireless | t301n | - | |
ruckuswireless | t301s_firmware | 10.5.1.0.199 | |
ruckuswireless | t301s | - | |
ruckuswireless | scg200_firmware | * | |
ruckuswireless | scg200 | - | |
ruckuswireless | sz-100_firmware | * | |
ruckuswireless | sz-100 | - | |
ruckuswireless | sz-300_firmware | * | |
ruckuswireless | sz-300 | - | |
ruckuswireless | vsz_firmware | * | |
ruckuswireless | vsz | - | |
ruckuswireless | zonedirector_1100_firmware | 9.10.2.0.130 | |
ruckuswireless | zonedirector_1100 | - | |
ruckuswireless | zonedirector_1200_firmware | 10.2.1.0.218 | |
ruckuswireless | zonedirector_1200 | - | |
ruckuswireless | zonedirector_3000_firmware | 10.2.1.0.218 | |
ruckuswireless | zonedirector_3000 | - | |
ruckuswireless | zonedirector_5000_firmware | 10.0.1.0.151 | |
ruckuswireless | zonedirector_5000 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:r310_firmware:10.5.1.0.199:*:*:*:*:*:*:*", "matchCriteriaId": "5ED8801F-2B0B-480D-876D-9F662B995851", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:r310:-:*:*:*:*:*:*:*", "matchCriteriaId": "40D3129E-4C02-484F-96B6-59D76F787D21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:r500_firmware:10.5.1.0.199:*:*:*:*:*:*:*", "matchCriteriaId": "E54CB15F-CA79-403B-A1B1-B7832B65EEC3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:r500:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BBDBE9C-BE4B-4ED6-AF62-8FE484C519E2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:r600_firmware:10.5.1.0.199:*:*:*:*:*:*:*", "matchCriteriaId": "27E05347-1CFD-46FC-999A-90E6C40CEE26", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:r600:-:*:*:*:*:*:*:*", "matchCriteriaId": "5421B1D7-E630-4BDA-BA34-7DD8D0738DF4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:t300_firmware:10.5.1.0.199:*:*:*:*:*:*:*", "matchCriteriaId": "5D91278C-B07E-44FF-ABBA-10E8B5830FFA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:t300:-:*:*:*:*:*:*:*", "matchCriteriaId": "0511674E-59A6-427C-A265-B277D84DE301", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:t301n_firmware:10.5.1.0.199:*:*:*:*:*:*:*", "matchCriteriaId": "E0412E29-6DB5-4C01-B8C3-702EB7EBE8DE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:t301n:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBB7A43E-F5F1-465A-841F-05214EDA6833", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:t301s_firmware:10.5.1.0.199:*:*:*:*:*:*:*", "matchCriteriaId": "6DAA3771-2795-403D-8506-C155403C8B7C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:t301s:-:*:*:*:*:*:*:*", "matchCriteriaId": "68C4D9AC-5B1C-4066-8216-3F7127C3CC64", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:scg200_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "775F1067-344F-49AD-9901-97D2F1AC5F0F", "versionEndExcluding": "3.6.2.0.795", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:scg200:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6FB3968-8D8A-4D04-B3D1-18A28CA8C249", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:sz-100_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "46BCF71C-8A66-45C8-B1ED-8957B670CBF5", "versionEndExcluding": "3.6.2.0.795", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:sz-100:-:*:*:*:*:*:*:*", "matchCriteriaId": "3B9F3E41-79CA-45B7-B799-B0A64E60BA16", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:sz-300_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7CEA2295-79BE-4728-8BF2-DEAB2BCAA0E5", "versionEndExcluding": "3.6.2.0.795", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:sz-300:-:*:*:*:*:*:*:*", "matchCriteriaId": "4087D2FB-0853-40AE-A03F-803B5972A404", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:vsz_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B3E5690D-7955-4E12-AE51-C3CDAD596096", "versionEndExcluding": "3.6.2.0.795", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:vsz:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1E9A46B-D8E4-489A-8648-28EDDF000E28", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:zonedirector_1100_firmware:9.10.2.0.130:*:*:*:*:*:*:*", "matchCriteriaId": "76872953-AA21-41F1-832E-5CD04CA0FF9A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:zonedirector_1100:-:*:*:*:*:*:*:*", "matchCriteriaId": "CF376AF6-E73A-425B-8E31-36330D8FEB73", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:zonedirector_1200_firmware:10.2.1.0.218:*:*:*:*:*:*:*", "matchCriteriaId": "83AD20A3-C56E-4436-A9CC-29884EF9EB67", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:zonedirector_1200:-:*:*:*:*:*:*:*", "matchCriteriaId": "0FE0C2B2-D14B-4798-95C4-F911B3B1D88E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:zonedirector_3000_firmware:10.2.1.0.218:*:*:*:*:*:*:*", "matchCriteriaId": "86A26EBE-4077-4DE7-BC6C-D38F5A3D3E7B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:zonedirector_3000:-:*:*:*:*:*:*:*", "matchCriteriaId": "5A1F42A8-8785-48A5-B0B0-68504EFD38B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:zonedirector_5000_firmware:10.0.1.0.151:*:*:*:*:*:*:*", "matchCriteriaId": "04D53E59-6431-4ED3-BA0B-E54B2FBCDE0D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:zonedirector_5000:-:*:*:*:*:*:*:*", "matchCriteriaId": "1DA49DE5-DA7F-4531-9ACF-353561DA90E4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Ruckus R310 10.5.1.0.199, Ruckus R500 10.5.1.0.199, Ruckus R600 10.5.1.0.199, Ruckus T300 10.5.1.0.199, Ruckus T301n 10.5.1.0.199, Ruckus T301s 10.5.1.0.199, SmartCell Gateway 200 (SCG200) before 3.6.2.0.795, SmartZone 100 (SZ-100) before 3.6.2.0.795, SmartZone 300 (SZ300) before 3.6.2.0.795, Virtual SmartZone (vSZ) before 3.6.2.0.795, ZoneDirector 1100 9.10.2.0.130, ZoneDirector 1200 10.2.1.0.218, ZoneDirector 3000 10.2.1.0.218, ZoneDirector 5000 10.0.1.0.151, a vulnerability allows attackers to switch completely to unauthorized image to be Boot as primary verified image." }, { "lang": "es", "value": "En Ruckus R310 10.5.1.0.199, Ruckus R500 10.5.1.0.199, Ruckus R600 10.5.1.0.199, Ruckus T300 10.5.1.0.199, Ruckus T301n 10.5.1.0.199, Ruckus T301s 10.5.1.0 .199, celda inteligente Gateway 200 (SCG200) anterior a 3.6.2.0.795, SmartZone 100 (SZ-100) anterior a 3.6.2.0.795, SmartZone 300 (SZ300) anterior a 3.6.2.0.795, Virtual SmartZone (vSZ) anterior a 3.6.2.0.795, ZoneDirector 1100 9.10.2.0.130, ZoneDirector 1200 10.2.1.0.218, ZoneDirector 3000 10.2.1.0.218, ZoneDirector 5000 10.0.1.0.151, una vulnerabilidad permite a los atacantes cambiar completamente a una imagen no autorizada para iniciarse como imagen principal verificada." } ], "id": "CVE-2020-22658", "lastModified": "2025-04-03T21:15:37.287", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2023-01-20T19:15:12.843", "references": [ { "source": "cve@mitre.org", "url": "https://hdhrmi.blogspot.com/2020/03/multiple-vulnerabilities-in-ruckus.html?m=1" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://support.ruckuswireless.com/security_bulletins/302" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://support.ruckuswireless.com/security_bulletins/302" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-494" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2020-01-19 21:15
Modified
2024-11-21 05:36
Severity ?
Summary
Ruckus ZoneFlex R310 104.0.0.0.1347 devices allow Stored XSS via the SSID field on the Configuration > Radio 2.4G > Wireless X screen (after a successful login to the super account).
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://sku11army.blogspot.com/2020/01/ruckus-wireless-authenticated-stored.html | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://sku11army.blogspot.com/2020/01/ruckus-wireless-authenticated-stored.html | Exploit, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ruckuswireless | r310_firmware | 104.0.0.0.1347 | |
ruckuswireless | r310 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:r310_firmware:104.0.0.0.1347:*:*:*:*:*:*:*", "matchCriteriaId": "B110FD84-AD90-4B71-B56C-733D6C5C44EF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:r310:-:*:*:*:*:*:*:*", "matchCriteriaId": "40D3129E-4C02-484F-96B6-59D76F787D21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Ruckus ZoneFlex R310 104.0.0.0.1347 devices allow Stored XSS via the SSID field on the Configuration \u003e Radio 2.4G \u003e Wireless X screen (after a successful login to the super account)." }, { "lang": "es", "value": "Los dispositivos Ruckus ZoneFlex R310 versi\u00f3n 104.0.0.0.1347, permiten un ataque de tipo XSS almacenado por medio del campo SSID en la pantalla Configuration ) Radio 2.4G ) Wireless X (despu\u00e9s de un inicio de sesi\u00f3n con \u00e9xito en la cuenta super)." } ], "id": "CVE-2020-7234", "lastModified": "2024-11-21T05:36:53.223", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-01-19T21:15:10.943", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://sku11army.blogspot.com/2020/01/ruckus-wireless-authenticated-stored.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://sku11army.blogspot.com/2020/01/ruckus-wireless-authenticated-stored.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-12-07 07:15
Modified
2025-08-22 21:09
Severity ?
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Summary
A cross-site-scripting vulnerability exists in Ruckus Access Point products (ZoneDirector, SmartZone, and AP Solo). If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who is logging in the product. As for the affected products/models/versions, see the information provided by the vendor listed under [References] section or the list under [Product Status] section.
References
▼ | URL | Tags | |
---|---|---|---|
vultures@jpcert.or.jp | https://jvn.jp/en/jp/JVN45891816/ | Third Party Advisory | |
vultures@jpcert.or.jp | https://support.ruckuswireless.com/security_bulletins/323 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://jvn.jp/en/jp/JVN45891816/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.ruckuswireless.com/security_bulletins/323 | Patch, Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:r750_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "19637FB4-A1EC-4DDB-9FD2-B176427B9933", "versionEndIncluding": "114.0.0.0.6565", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:r750:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA49CB45-1196-4AD7-8AB6-C5593BBF015F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:r650_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2F805AE7-830E-4D88-AA80-40FEC783AC84", "versionEndIncluding": "114.0.0.0.6565", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:r650:-:*:*:*:*:*:*:*", "matchCriteriaId": "951BDA12-0294-472A-9292-F60AC6D4292B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:r730_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4F98CC2D-247B-493F-A1DD-8133622C2AE7", "versionEndIncluding": "114.0.0.0.6565", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:r730:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB28A5E0-6F42-4133-B1D3-1D0116079094", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:t750_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DFCDC4FB-7448-4E19-AF4D-897180F3775B", "versionEndIncluding": "114.0.0.0.6565", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:t750:-:*:*:*:*:*:*:*", "matchCriteriaId": "5C15AA25-82B2-4C02-8361-E8F6179B525A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:r510_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5D6269F0-AFA6-48A9-92D2-3A3250B1E6C0", "versionEndIncluding": "114.0.0.0.6565", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:r510:-:*:*:*:*:*:*:*", "matchCriteriaId": "80B2E8CC-EACE-4A80-9EB1-DADAB8034415", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:e510_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2D2FB77C-1E97-44C5-A961-7F91B1A8AB34", "versionEndIncluding": "114.0.0.0.6565", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:e510:-:*:*:*:*:*:*:*", "matchCriteriaId": "FBF5C92C-C889-4732-BB00-E6D55613E410", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:c110_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6531A85F-9AA8-4A26-9A81-09003B8AAF2E", "versionEndIncluding": "114.0.0.0.6565", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:c110:-:*:*:*:*:*:*:*", "matchCriteriaId": "A77671DB-6197-4C8D-B667-A0081350E5AF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:r320_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7C00DA68-6EA2-4D88-B60C-6980D4953912", "versionEndIncluding": "114.0.0.0.6565", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:r320:-:*:*:*:*:*:*:*", "matchCriteriaId": "93CE3224-85D2-4039-8F24-BB503DFD42C2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:h510_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "843E61F5-DE53-47B3-BF24-B817BE9F334E", "versionEndIncluding": "114.0.0.0.6565", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:h510:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB1FAB48-786A-4FB3-AB6D-3118E94E68C7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:h320_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F625B309-F3BC-4899-B6B4-C460B7502730", "versionEndIncluding": "114.0.0.0.6565", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:h320:-:*:*:*:*:*:*:*", "matchCriteriaId": "282C3A1D-711C-4415-B9BE-A9B518204AEB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:t305_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2ED5CB06-9A07-4EF6-B730-7D24B8E131F7", "versionEndIncluding": "114.0.0.0.6565", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:t305:-:*:*:*:*:*:*:*", "matchCriteriaId": "0500E6E8-D56C-41EC-B9C5-72C5DD955639", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:m510_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3EB3F18F-04F1-4D37-A74C-B12ED64ECDEE", "versionEndIncluding": "114.0.0.0.6565", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:m510:-:*:*:*:*:*:*:*", "matchCriteriaId": "D4AE7200-4090-4B81-A22F-B8553A014D21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:r720_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "73590841-C0E4-423B-89F3-C5E3E5DC3A84", "versionEndIncluding": "114.0.0.0.6565", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:r720:-:*:*:*:*:*:*:*", "matchCriteriaId": "DDFDAF0A-9F5D-4E34-805E-6F27103AAA32", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:r710_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CD213C0E-8D62-43C1-AAAD-72AB2455F4C8", "versionEndIncluding": "114.0.0.0.6565", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:r710:-:*:*:*:*:*:*:*", "matchCriteriaId": "E95884E9-C6AF-4106-A178-9274AD27EF65", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:t710_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1AC75B29-992F-4917-B0A9-6B4C16905E3A", "versionEndIncluding": "114.0.0.0.6565", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:t710:-:*:*:*:*:*:*:*", "matchCriteriaId": "A40B9489-D999-4355-953E-36A7F8DEF299", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:t610_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0273FF13-6329-4A68-B2B1-674D0FDCEACC", "versionEndIncluding": "114.0.0.0.6565", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:t610:-:*:*:*:*:*:*:*", "matchCriteriaId": "210D55AB-9305-4D0B-B9F0-47889D37373B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:r610_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7CA61CD3-AFD8-4C9B-B707-850A352EFF63", "versionEndIncluding": "114.0.0.0.6565", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:r610:-:*:*:*:*:*:*:*", "matchCriteriaId": "4244947C-538E-4B83-B4F4-3DD4F3C22E83", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:t310d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3D3D9629-CDD0-497E-A798-BD68696D7B0A", "versionEndIncluding": "114.0.0.0.6565", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:t310d:-:*:*:*:*:*:*:*", "matchCriteriaId": "C2D3E8C6-4676-4B74-A252-132A26670C64", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:t310s_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "47656F30-691A-4072-B5DF-0B4026133B24", "versionEndIncluding": "114.0.0.0.6565", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:t310s:-:*:*:*:*:*:*:*", "matchCriteriaId": "72378D4B-ADB5-4DE5-BB92-1778BDFD61FC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:t310n_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8508F154-5538-401A-8A1E-192C38A482B4", "versionEndIncluding": "114.0.0.0.6565", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:t310n:-:*:*:*:*:*:*:*", "matchCriteriaId": "2ED4C9B4-7F70-4059-8592-FD3F034160C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:t310c_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D50969FD-837B-49B3-820E-E02CA9CD75E3", "versionEndIncluding": "114.0.0.0.6565", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:t310c:-:*:*:*:*:*:*:*", "matchCriteriaId": "BFB69C4E-2B4F-4F61-8A65-9BA0354F33E3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:t710s_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "11907B93-2CC9-43E7-98E9-B13370225009", "versionEndIncluding": "114.0.0.0.6565", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:t710s:-:*:*:*:*:*:*:*", "matchCriteriaId": "4CFF0772-D853-4781-B326-E3BDEAC78EE0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:t610s_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A6B8C9F8-76A1-4B8C-8FB9-770CB0E7DC94", "versionEndIncluding": "114.0.0.0.6565", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:t610s:-:*:*:*:*:*:*:*", "matchCriteriaId": "752CBB38-F5C6-4666-B062-B5E3B15CA1A0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:r550_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "260442D7-362E-4141-BE55-066154A5B587", "versionEndIncluding": "114.0.0.0.5585", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:r550:-:*:*:*:*:*:*:*", "matchCriteriaId": "215024F9-C68E-4919-9FD5-215CF900A830", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:r850_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "392561BB-1413-44A3-B4D1-CC4A57DC67F1", "versionEndIncluding": "114.0.0.0.5585", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:r850:-:*:*:*:*:*:*:*", "matchCriteriaId": "3A244DE5-A9B3-45BE-8AD1-154546F4F1F4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:t750se_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0F079E97-F62E-4919-A21B-1443146FEB14", "versionEndIncluding": "114.0.0.0.5585", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:t750se:-:*:*:*:*:*:*:*", "matchCriteriaId": "9E1DE3AD-CA13-44CE-ACF1-3DE2D6C691BC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:r310_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0F6AF187-4EC5-4F8A-9FB3-E1FD4F71FA4F", "versionEndIncluding": "110.0.0.0.2014", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:r310:*:*:*:*:*:*:*:*", "matchCriteriaId": "93655935-481F-477B-A0C3-EFFFB822C9D5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:r760_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "22D73A1E-302B-4494-B0CF-48D298A25916", "versionEndIncluding": "118.1.0.0.1274", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:r760:*:*:*:*:*:*:*:*", "matchCriteriaId": "700D0FAA-0964-486A-932B-08CF1A328468", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:r760_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "22D73A1E-302B-4494-B0CF-48D298A25916", "versionEndIncluding": "118.1.0.0.1274", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:r760:*:*:*:*:*:*:*:*", "matchCriteriaId": "700D0FAA-0964-486A-932B-08CF1A328468", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:r560_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1BEFF83F-4F8E-4BFE-B964-2F019A846EF0", "versionEndIncluding": "118.1.0.0.1908", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:r560:*:*:*:*:*:*:*:*", "matchCriteriaId": "75E00EC7-030F-4E90-8747-4AA87C2DA73D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:h550_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DFDDACE4-B572-4E7F-8D7C-333B3108D0F8", "versionEndIncluding": "116.0.0.0.1506", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:h550:*:*:*:*:*:*:*:*", "matchCriteriaId": "843E2FCE-C3EC-406A-8ECB-BA5F51C2DCFF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:h350_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F1056C4F-1A29-474A-AD6F-6911F68ED36E", "versionEndIncluding": "116.0.0.0.3128", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:h350:*:*:*:*:*:*:*:*", "matchCriteriaId": "389825B3-BD3F-48F9-A6EB-238D1485E24D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:t350c_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "561DDAE6-C5A0-4DA8-AC07-0EF7D06A8848", "versionEndIncluding": "116.0.0.0.1543", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:t350c:*:*:*:*:*:*:*:*", "matchCriteriaId": "663BF055-A677-418A-8009-599D7BE04221", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:t350d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C77FF583-1BAF-4042-A5F0-07DF1FC4C5E4", "versionEndIncluding": "116.0.0.0.1543", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:t350d:*:*:*:*:*:*:*:*", "matchCriteriaId": "4323CCB1-EE5E-498F-86F3-00CE6C75F10D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:t350se_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BCC95847-0984-466D-9227-5A44971260F2", "versionEndIncluding": "116.0.0.0.3136", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:t350se:*:*:*:*:*:*:*:*", "matchCriteriaId": "60A48D4A-75D9-486B-896D-7BF11AD3ED6B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:r350_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "004DED59-2353-40D5-997A-E021728E4F23", "versionEndIncluding": "116.0.0.0.1655", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:r350:*:*:*:*:*:*:*:*", "matchCriteriaId": "34B3B5B6-3365-47B2-847E-004489533CDA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:smartzone_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6E0D700D-F65B-49CC-BA09-41B22A6884C1", "versionEndIncluding": "6.1.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:commscope:ruckus_smartzone:-:*:*:*:*:*:*:*", "matchCriteriaId": "92A4B5B7-E8A5-4FE1-8947-7BA90A37516A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:zonedirector_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E1DA133A-1251-4946-BC27-FECABFEA056A", "versionEndIncluding": "10.5.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:zonedirector:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC847897-E9C7-4247-BC22-E999847E1110", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A cross-site-scripting vulnerability exists in Ruckus Access Point products (ZoneDirector, SmartZone, and AP Solo). If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who is logging in the product. As for the affected products/models/versions, see the information provided by the vendor listed under [References] section or the list under [Product Status] section." }, { "lang": "es", "value": "Existe una vulnerabilidad de Cross-Site-Scripting en los productos Ruckus Access Point (ZoneDirector, SmartZone y AP Solo). Si se explota esta vulnerabilidad, se puede ejecutar un script arbitrario en el navegador web del usuario que inicia sesi\u00f3n en el producto. En cuanto a los productos/modelos/versiones afectados, consulte la informaci\u00f3n proporcionada por el proveedor que figura en la secci\u00f3n [Referencias] o la lista en la secci\u00f3n [Estado del producto]." } ], "id": "CVE-2023-49225", "lastModified": "2025-08-22T21:09:15.577", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2023-12-07T07:15:12.880", "references": [ { "source": "vultures@jpcert.or.jp", "tags": [ "Third Party Advisory" ], "url": "https://jvn.jp/en/jp/JVN45891816/" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://support.ruckuswireless.com/security_bulletins/323" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://jvn.jp/en/jp/JVN45891816/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://support.ruckuswireless.com/security_bulletins/323" } ], "sourceIdentifier": "vultures@jpcert.or.jp", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2023-01-20 19:15
Modified
2025-04-03 18:15
Severity ?
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Summary
In Ruckus R310 10.5.1.0.199, Ruckus R500 10.5.1.0.199, Ruckus R600 10.5.1.0.199, Ruckus T300 10.5.1.0.199, Ruckus T301n 10.5.1.0.199, Ruckus T301s 10.5.1.0.199, SmartCell Gateway 200 (SCG200) before 3.6.2.0.795, SmartZone 100 (SZ-100) before 3.6.2.0.795, SmartZone 300 (SZ300) before 3.6.2.0.795, Virtual SmartZone (vSZ) before 3.6.2.0.795, ZoneDirector 1100 9.10.2.0.130, ZoneDirector 1200 10.2.1.0.218, ZoneDirector 3000 10.2.1.0.218, ZoneDirector 5000 10.0.1.0.151, a vulnerability allows attackers to force bypass Secure Boot failed attempts and run temporarily the previous Backup image.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ruckuswireless | r310_firmware | 10.5.1.0.199 | |
ruckuswireless | r310 | - | |
ruckuswireless | r500_firmware | 10.5.1.0.199 | |
ruckuswireless | r500 | - | |
ruckuswireless | r600_firmware | 10.5.1.0.199 | |
ruckuswireless | r600 | - | |
ruckuswireless | t300_firmware | 10.5.1.0.199 | |
ruckuswireless | t300 | - | |
ruckuswireless | t301n_firmware | 10.5.1.0.199 | |
ruckuswireless | t301n | - | |
ruckuswireless | t301s_firmware | 10.5.1.0.199 | |
ruckuswireless | t301s | - | |
ruckuswireless | scg200_firmware | * | |
ruckuswireless | scg200 | - | |
ruckuswireless | sz-100_firmware | * | |
ruckuswireless | sz-100 | - | |
ruckuswireless | sz-300_firmware | * | |
ruckuswireless | sz-300 | - | |
ruckuswireless | vsz_firmware | * | |
ruckuswireless | vsz | - | |
ruckuswireless | zonedirector_1100_firmware | 9.10.2.0.130 | |
ruckuswireless | zonedirector_1100 | - | |
ruckuswireless | zonedirector_1200_firmware | 10.2.1.0.218 | |
ruckuswireless | zonedirector_1200 | - | |
ruckuswireless | zonedirector_3000_firmware | 10.2.1.0.218 | |
ruckuswireless | zonedirector_3000 | - | |
ruckuswireless | zonedirector_5000_firmware | 10.0.1.0.151 | |
ruckuswireless | zonedirector_5000 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:r310_firmware:10.5.1.0.199:*:*:*:*:*:*:*", "matchCriteriaId": "5ED8801F-2B0B-480D-876D-9F662B995851", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:r310:-:*:*:*:*:*:*:*", "matchCriteriaId": "40D3129E-4C02-484F-96B6-59D76F787D21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:r500_firmware:10.5.1.0.199:*:*:*:*:*:*:*", "matchCriteriaId": "E54CB15F-CA79-403B-A1B1-B7832B65EEC3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:r500:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BBDBE9C-BE4B-4ED6-AF62-8FE484C519E2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:r600_firmware:10.5.1.0.199:*:*:*:*:*:*:*", "matchCriteriaId": "27E05347-1CFD-46FC-999A-90E6C40CEE26", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:r600:-:*:*:*:*:*:*:*", "matchCriteriaId": "5421B1D7-E630-4BDA-BA34-7DD8D0738DF4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:t300_firmware:10.5.1.0.199:*:*:*:*:*:*:*", "matchCriteriaId": "5D91278C-B07E-44FF-ABBA-10E8B5830FFA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:t300:-:*:*:*:*:*:*:*", "matchCriteriaId": "0511674E-59A6-427C-A265-B277D84DE301", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:t301n_firmware:10.5.1.0.199:*:*:*:*:*:*:*", "matchCriteriaId": "E0412E29-6DB5-4C01-B8C3-702EB7EBE8DE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:t301n:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBB7A43E-F5F1-465A-841F-05214EDA6833", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:t301s_firmware:10.5.1.0.199:*:*:*:*:*:*:*", "matchCriteriaId": "6DAA3771-2795-403D-8506-C155403C8B7C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:t301s:-:*:*:*:*:*:*:*", "matchCriteriaId": "68C4D9AC-5B1C-4066-8216-3F7127C3CC64", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:scg200_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "775F1067-344F-49AD-9901-97D2F1AC5F0F", "versionEndExcluding": "3.6.2.0.795", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:scg200:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6FB3968-8D8A-4D04-B3D1-18A28CA8C249", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:sz-100_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "46BCF71C-8A66-45C8-B1ED-8957B670CBF5", "versionEndExcluding": "3.6.2.0.795", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:sz-100:-:*:*:*:*:*:*:*", "matchCriteriaId": "3B9F3E41-79CA-45B7-B799-B0A64E60BA16", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:sz-300_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7CEA2295-79BE-4728-8BF2-DEAB2BCAA0E5", "versionEndExcluding": "3.6.2.0.795", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:sz-300:-:*:*:*:*:*:*:*", "matchCriteriaId": "4087D2FB-0853-40AE-A03F-803B5972A404", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:vsz_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B3E5690D-7955-4E12-AE51-C3CDAD596096", "versionEndExcluding": "3.6.2.0.795", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:vsz:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1E9A46B-D8E4-489A-8648-28EDDF000E28", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:zonedirector_1100_firmware:9.10.2.0.130:*:*:*:*:*:*:*", "matchCriteriaId": "76872953-AA21-41F1-832E-5CD04CA0FF9A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:zonedirector_1100:-:*:*:*:*:*:*:*", "matchCriteriaId": "CF376AF6-E73A-425B-8E31-36330D8FEB73", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:zonedirector_1200_firmware:10.2.1.0.218:*:*:*:*:*:*:*", "matchCriteriaId": "83AD20A3-C56E-4436-A9CC-29884EF9EB67", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:zonedirector_1200:-:*:*:*:*:*:*:*", "matchCriteriaId": "0FE0C2B2-D14B-4798-95C4-F911B3B1D88E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:zonedirector_3000_firmware:10.2.1.0.218:*:*:*:*:*:*:*", "matchCriteriaId": "86A26EBE-4077-4DE7-BC6C-D38F5A3D3E7B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:zonedirector_3000:-:*:*:*:*:*:*:*", "matchCriteriaId": "5A1F42A8-8785-48A5-B0B0-68504EFD38B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:zonedirector_5000_firmware:10.0.1.0.151:*:*:*:*:*:*:*", "matchCriteriaId": "04D53E59-6431-4ED3-BA0B-E54B2FBCDE0D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:zonedirector_5000:-:*:*:*:*:*:*:*", "matchCriteriaId": "1DA49DE5-DA7F-4531-9ACF-353561DA90E4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Ruckus R310 10.5.1.0.199, Ruckus R500 10.5.1.0.199, Ruckus R600 10.5.1.0.199, Ruckus T300 10.5.1.0.199, Ruckus T301n 10.5.1.0.199, Ruckus T301s 10.5.1.0.199, SmartCell Gateway 200 (SCG200) before 3.6.2.0.795, SmartZone 100 (SZ-100) before 3.6.2.0.795, SmartZone 300 (SZ300) before 3.6.2.0.795, Virtual SmartZone (vSZ) before 3.6.2.0.795, ZoneDirector 1100 9.10.2.0.130, ZoneDirector 1200 10.2.1.0.218, ZoneDirector 3000 10.2.1.0.218, ZoneDirector 5000 10.0.1.0.151, a vulnerability allows attackers to force bypass Secure Boot failed attempts and run temporarily the previous Backup image." }, { "lang": "es", "value": "En Ruckus R310 10.5.1.0.199, Ruckus R500 10.5.1.0.199, Ruckus R600 10.5.1.0.199, Ruckus T300 10.5.1.0.199, Ruckus T301n 10.5.1.0.199, Ruckus T301s 10.5.1.0 .199, celda inteligente Gateway 200 (SCG200) anterior a 3.6.2.0.795, SmartZone 100 (SZ-100) anterior a 3.6.2.0.795, SmartZone 300 (SZ300) anterior a 3.6.2.0.795, Virtual SmartZone (vSZ) anterior a 3.6.2.0.795, ZoneDirector 1100 9.10.2.0.130, ZoneDirector 1200 10.2.1.0.218, ZoneDirector 3000 10.2.1.0.218, ZoneDirector 5000 10.0.1.0.151, una vulnerabilidad permite a los atacantes forzar eludir los intentos fallidos de arranque seguro y ejecutar temporalmente la imagen de copia de seguridad anterior." } ], "id": "CVE-2020-22660", "lastModified": "2025-04-03T18:15:40.227", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2023-01-20T19:15:12.953", "references": [ { "source": "cve@mitre.org", "url": "https://hdhrmi.blogspot.com/2020/03/multiple-vulnerabilities-in-ruckus.html?m=1" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://support.ruckuswireless.com/security_bulletins/302" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://support.ruckuswireless.com/security_bulletins/302" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-290" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2023-01-20 19:15
Modified
2025-04-03 18:15
Severity ?
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
Summary
In Ruckus R310 10.5.1.0.199, Ruckus R500 10.5.1.0.199, Ruckus R600 10.5.1.0.199, Ruckus T300 10.5.1.0.199, Ruckus T301n 10.5.1.0.199, Ruckus T301s 10.5.1.0.199, SmartCell Gateway 200 (SCG200) before 3.6.2.0.795, SmartZone 100 (SZ-100) before 3.6.2.0.795, SmartZone 300 (SZ300) before 3.6.2.0.795, Virtual SmartZone (vSZ) before 3.6.2.0.795, ZoneDirector 1100 9.10.2.0.130, ZoneDirector 1200 10.2.1.0.218, ZoneDirector 3000 10.2.1.0.218, ZoneDirector 5000 10.0.1.0.151, a vulnerability allows attackers to erase the backup secondary official image and write secondary backup unauthorized image.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ruckuswireless | r310_firmware | 10.5.1.0.199 | |
ruckuswireless | r310 | - | |
ruckuswireless | r500_firmware | 10.5.1.0.199 | |
ruckuswireless | r500 | - | |
ruckuswireless | r600_firmware | 10.5.1.0.199 | |
ruckuswireless | r600 | - | |
ruckuswireless | t300_firmware | 10.5.1.0.199 | |
ruckuswireless | t300 | - | |
ruckuswireless | t301n_firmware | 10.5.1.0.199 | |
ruckuswireless | t301n | - | |
ruckuswireless | t301s_firmware | 10.5.1.0.199 | |
ruckuswireless | t301s | - | |
ruckuswireless | scg200_firmware | * | |
ruckuswireless | scg200 | - | |
ruckuswireless | sz-100_firmware | * | |
ruckuswireless | sz-100 | - | |
ruckuswireless | sz-300_firmware | * | |
ruckuswireless | sz-300 | - | |
ruckuswireless | vsz_firmware | * | |
ruckuswireless | vsz | - | |
ruckuswireless | zonedirector_1100_firmware | 9.10.2.0.130 | |
ruckuswireless | zonedirector_1100 | - | |
ruckuswireless | zonedirector_1200_firmware | 10.2.1.0.218 | |
ruckuswireless | zonedirector_1200 | - | |
ruckuswireless | zonedirector_3000_firmware | 10.2.1.0.218 | |
ruckuswireless | zonedirector_3000 | - | |
ruckuswireless | zonedirector_5000_firmware | 10.0.1.0.151 | |
ruckuswireless | zonedirector_5000 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:r310_firmware:10.5.1.0.199:*:*:*:*:*:*:*", "matchCriteriaId": "5ED8801F-2B0B-480D-876D-9F662B995851", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:r310:-:*:*:*:*:*:*:*", "matchCriteriaId": "40D3129E-4C02-484F-96B6-59D76F787D21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:r500_firmware:10.5.1.0.199:*:*:*:*:*:*:*", "matchCriteriaId": "E54CB15F-CA79-403B-A1B1-B7832B65EEC3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:r500:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BBDBE9C-BE4B-4ED6-AF62-8FE484C519E2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:r600_firmware:10.5.1.0.199:*:*:*:*:*:*:*", "matchCriteriaId": "27E05347-1CFD-46FC-999A-90E6C40CEE26", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:r600:-:*:*:*:*:*:*:*", "matchCriteriaId": "5421B1D7-E630-4BDA-BA34-7DD8D0738DF4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:t300_firmware:10.5.1.0.199:*:*:*:*:*:*:*", "matchCriteriaId": "5D91278C-B07E-44FF-ABBA-10E8B5830FFA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:t300:-:*:*:*:*:*:*:*", "matchCriteriaId": "0511674E-59A6-427C-A265-B277D84DE301", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:t301n_firmware:10.5.1.0.199:*:*:*:*:*:*:*", "matchCriteriaId": "E0412E29-6DB5-4C01-B8C3-702EB7EBE8DE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:t301n:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBB7A43E-F5F1-465A-841F-05214EDA6833", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:t301s_firmware:10.5.1.0.199:*:*:*:*:*:*:*", "matchCriteriaId": "6DAA3771-2795-403D-8506-C155403C8B7C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:t301s:-:*:*:*:*:*:*:*", "matchCriteriaId": "68C4D9AC-5B1C-4066-8216-3F7127C3CC64", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:scg200_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "775F1067-344F-49AD-9901-97D2F1AC5F0F", "versionEndExcluding": "3.6.2.0.795", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:scg200:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6FB3968-8D8A-4D04-B3D1-18A28CA8C249", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:sz-100_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "46BCF71C-8A66-45C8-B1ED-8957B670CBF5", "versionEndExcluding": "3.6.2.0.795", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:sz-100:-:*:*:*:*:*:*:*", "matchCriteriaId": "3B9F3E41-79CA-45B7-B799-B0A64E60BA16", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:sz-300_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7CEA2295-79BE-4728-8BF2-DEAB2BCAA0E5", "versionEndExcluding": "3.6.2.0.795", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:sz-300:-:*:*:*:*:*:*:*", "matchCriteriaId": "4087D2FB-0853-40AE-A03F-803B5972A404", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:vsz_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B3E5690D-7955-4E12-AE51-C3CDAD596096", "versionEndExcluding": "3.6.2.0.795", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:vsz:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1E9A46B-D8E4-489A-8648-28EDDF000E28", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:zonedirector_1100_firmware:9.10.2.0.130:*:*:*:*:*:*:*", "matchCriteriaId": "76872953-AA21-41F1-832E-5CD04CA0FF9A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:zonedirector_1100:-:*:*:*:*:*:*:*", "matchCriteriaId": "CF376AF6-E73A-425B-8E31-36330D8FEB73", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:zonedirector_1200_firmware:10.2.1.0.218:*:*:*:*:*:*:*", "matchCriteriaId": "83AD20A3-C56E-4436-A9CC-29884EF9EB67", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:zonedirector_1200:-:*:*:*:*:*:*:*", "matchCriteriaId": "0FE0C2B2-D14B-4798-95C4-F911B3B1D88E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:zonedirector_3000_firmware:10.2.1.0.218:*:*:*:*:*:*:*", "matchCriteriaId": "86A26EBE-4077-4DE7-BC6C-D38F5A3D3E7B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:zonedirector_3000:-:*:*:*:*:*:*:*", "matchCriteriaId": "5A1F42A8-8785-48A5-B0B0-68504EFD38B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:zonedirector_5000_firmware:10.0.1.0.151:*:*:*:*:*:*:*", "matchCriteriaId": "04D53E59-6431-4ED3-BA0B-E54B2FBCDE0D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:zonedirector_5000:-:*:*:*:*:*:*:*", "matchCriteriaId": "1DA49DE5-DA7F-4531-9ACF-353561DA90E4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Ruckus R310 10.5.1.0.199, Ruckus R500 10.5.1.0.199, Ruckus R600 10.5.1.0.199, Ruckus T300 10.5.1.0.199, Ruckus T301n 10.5.1.0.199, Ruckus T301s 10.5.1.0.199, SmartCell Gateway 200 (SCG200) before 3.6.2.0.795, SmartZone 100 (SZ-100) before 3.6.2.0.795, SmartZone 300 (SZ300) before 3.6.2.0.795, Virtual SmartZone (vSZ) before 3.6.2.0.795, ZoneDirector 1100 9.10.2.0.130, ZoneDirector 1200 10.2.1.0.218, ZoneDirector 3000 10.2.1.0.218, ZoneDirector 5000 10.0.1.0.151, a vulnerability allows attackers to erase the backup secondary official image and write secondary backup unauthorized image." }, { "lang": "es", "value": "En Ruckus R310 10.5.1.0.199, Ruckus R500 10.5.1.0.199, Ruckus R600 10.5.1.0.199, Ruckus T300 10.5.1.0.199, Ruckus T301n 10.5.1.0.199, Ruckus T301s 10.5.1.0 .199, celda inteligente Gateway 200 (SCG200) anterior a 3.6.2.0.795, SmartZone 100 (SZ-100) anterior a 3.6.2.0.795, SmartZone 300 (SZ300) anterior a 3.6.2.0.795, Virtual SmartZone (vSZ) anterior a 3.6.2.0.795, ZoneDirector 1100 9.10.2.0.130, ZoneDirector 1200 10.2.1.0.218, ZoneDirector 3000 10.2.1.0.218, ZoneDirector 5000 10.0.1.0.151, una vulnerabilidad permite a los atacantes borrar la imagen oficial secundaria de respaldo y escribir una imagen de respaldo secundaria no autorizada." } ], "id": "CVE-2020-22661", "lastModified": "2025-04-03T18:15:40.423", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 2.5, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 2.5, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2023-01-20T19:15:13.007", "references": [ { "source": "cve@mitre.org", "url": "https://hdhrmi.blogspot.com/2020/03/multiple-vulnerabilities-in-ruckus.html?m=1" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://support.ruckuswireless.com/security_bulletins/302" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://support.ruckuswireless.com/security_bulletins/302" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-306" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2023-01-20 19:15
Modified
2025-04-03 18:15
Severity ?
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Summary
In Ruckus R310 10.5.1.0.199, Ruckus R500 10.5.1.0.199, Ruckus R600 10.5.1.0.199, Ruckus T300 10.5.1.0.199, Ruckus T301n 10.5.1.0.199, Ruckus T301s 10.5.1.0.199, SmartCell Gateway 200 (SCG200) before 3.6.2.0.795, SmartZone 100 (SZ-100) before 3.6.2.0.795, SmartZone 300 (SZ300) before 3.6.2.0.795, Virtual SmartZone (vSZ) before 3.6.2.0.795, ZoneDirector 1100 9.10.2.0.130, ZoneDirector 1200 10.2.1.0.218, ZoneDirector 3000 10.2.1.0.218, ZoneDirector 5000 10.0.1.0.151, a vulnerability allows attackers to change and set unauthorized "illegal region code" by remote code Execution command injection which leads to run illegal frequency with maxi output power. Vulnerability allows attacker to create an arbitrary amount of ssid wlans interface per radio which creates overhead over noise (the default max limit is 8 ssid only per radio in solo AP). Vulnerability allows attacker to unlock hidden regions by privilege command injection in WEB GUI.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ruckuswireless | r310_firmware | 10.5.1.0.199 | |
ruckuswireless | r310 | - | |
ruckuswireless | r500_firmware | 10.5.1.0.199 | |
ruckuswireless | r500 | - | |
ruckuswireless | r600_firmware | 10.5.1.0.199 | |
ruckuswireless | r600 | - | |
ruckuswireless | t300_firmware | 10.5.1.0.199 | |
ruckuswireless | t300 | - | |
ruckuswireless | t301n_firmware | 10.5.1.0.199 | |
ruckuswireless | t301n | - | |
ruckuswireless | t301s_firmware | 10.5.1.0.199 | |
ruckuswireless | t301s | - | |
ruckuswireless | scg200_firmware | * | |
ruckuswireless | scg200 | - | |
ruckuswireless | sz-100_firmware | * | |
ruckuswireless | sz-100 | - | |
ruckuswireless | sz-300_firmware | * | |
ruckuswireless | sz-300 | - | |
ruckuswireless | vsz_firmware | * | |
ruckuswireless | vsz | - | |
ruckuswireless | zonedirector_1100_firmware | 9.10.2.0.130 | |
ruckuswireless | zonedirector_1100 | - | |
ruckuswireless | zonedirector_1200_firmware | 10.2.1.0.218 | |
ruckuswireless | zonedirector_1200 | - | |
ruckuswireless | zonedirector_3000_firmware | 10.2.1.0.218 | |
ruckuswireless | zonedirector_3000 | - | |
ruckuswireless | zonedirector_5000_firmware | 10.0.1.0.151 | |
ruckuswireless | zonedirector_5000 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:r310_firmware:10.5.1.0.199:*:*:*:*:*:*:*", "matchCriteriaId": "5ED8801F-2B0B-480D-876D-9F662B995851", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:r310:-:*:*:*:*:*:*:*", "matchCriteriaId": "40D3129E-4C02-484F-96B6-59D76F787D21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:r500_firmware:10.5.1.0.199:*:*:*:*:*:*:*", "matchCriteriaId": "E54CB15F-CA79-403B-A1B1-B7832B65EEC3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:r500:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BBDBE9C-BE4B-4ED6-AF62-8FE484C519E2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:r600_firmware:10.5.1.0.199:*:*:*:*:*:*:*", "matchCriteriaId": "27E05347-1CFD-46FC-999A-90E6C40CEE26", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:r600:-:*:*:*:*:*:*:*", "matchCriteriaId": "5421B1D7-E630-4BDA-BA34-7DD8D0738DF4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:t300_firmware:10.5.1.0.199:*:*:*:*:*:*:*", "matchCriteriaId": "5D91278C-B07E-44FF-ABBA-10E8B5830FFA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:t300:-:*:*:*:*:*:*:*", "matchCriteriaId": "0511674E-59A6-427C-A265-B277D84DE301", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:t301n_firmware:10.5.1.0.199:*:*:*:*:*:*:*", "matchCriteriaId": "E0412E29-6DB5-4C01-B8C3-702EB7EBE8DE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:t301n:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBB7A43E-F5F1-465A-841F-05214EDA6833", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:t301s_firmware:10.5.1.0.199:*:*:*:*:*:*:*", "matchCriteriaId": "6DAA3771-2795-403D-8506-C155403C8B7C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:t301s:-:*:*:*:*:*:*:*", "matchCriteriaId": "68C4D9AC-5B1C-4066-8216-3F7127C3CC64", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:scg200_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "775F1067-344F-49AD-9901-97D2F1AC5F0F", "versionEndExcluding": "3.6.2.0.795", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:scg200:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6FB3968-8D8A-4D04-B3D1-18A28CA8C249", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:sz-100_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "46BCF71C-8A66-45C8-B1ED-8957B670CBF5", "versionEndExcluding": "3.6.2.0.795", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:sz-100:-:*:*:*:*:*:*:*", "matchCriteriaId": "3B9F3E41-79CA-45B7-B799-B0A64E60BA16", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:sz-300_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7CEA2295-79BE-4728-8BF2-DEAB2BCAA0E5", "versionEndExcluding": "3.6.2.0.795", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:sz-300:-:*:*:*:*:*:*:*", "matchCriteriaId": "4087D2FB-0853-40AE-A03F-803B5972A404", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:vsz_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B3E5690D-7955-4E12-AE51-C3CDAD596096", "versionEndExcluding": "3.6.2.0.795", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:vsz:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1E9A46B-D8E4-489A-8648-28EDDF000E28", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:zonedirector_1100_firmware:9.10.2.0.130:*:*:*:*:*:*:*", "matchCriteriaId": "76872953-AA21-41F1-832E-5CD04CA0FF9A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:zonedirector_1100:-:*:*:*:*:*:*:*", "matchCriteriaId": "CF376AF6-E73A-425B-8E31-36330D8FEB73", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:zonedirector_1200_firmware:10.2.1.0.218:*:*:*:*:*:*:*", "matchCriteriaId": "83AD20A3-C56E-4436-A9CC-29884EF9EB67", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:zonedirector_1200:-:*:*:*:*:*:*:*", "matchCriteriaId": "0FE0C2B2-D14B-4798-95C4-F911B3B1D88E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:zonedirector_3000_firmware:10.2.1.0.218:*:*:*:*:*:*:*", "matchCriteriaId": "86A26EBE-4077-4DE7-BC6C-D38F5A3D3E7B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:zonedirector_3000:-:*:*:*:*:*:*:*", "matchCriteriaId": "5A1F42A8-8785-48A5-B0B0-68504EFD38B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:zonedirector_5000_firmware:10.0.1.0.151:*:*:*:*:*:*:*", "matchCriteriaId": "04D53E59-6431-4ED3-BA0B-E54B2FBCDE0D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:zonedirector_5000:-:*:*:*:*:*:*:*", "matchCriteriaId": "1DA49DE5-DA7F-4531-9ACF-353561DA90E4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Ruckus R310 10.5.1.0.199, Ruckus R500 10.5.1.0.199, Ruckus R600 10.5.1.0.199, Ruckus T300 10.5.1.0.199, Ruckus T301n 10.5.1.0.199, Ruckus T301s 10.5.1.0.199, SmartCell Gateway 200 (SCG200) before 3.6.2.0.795, SmartZone 100 (SZ-100) before 3.6.2.0.795, SmartZone 300 (SZ300) before 3.6.2.0.795, Virtual SmartZone (vSZ) before 3.6.2.0.795, ZoneDirector 1100 9.10.2.0.130, ZoneDirector 1200 10.2.1.0.218, ZoneDirector 3000 10.2.1.0.218, ZoneDirector 5000 10.0.1.0.151, a vulnerability allows attackers to change and set unauthorized \"illegal region code\" by remote code Execution command injection which leads to run illegal frequency with maxi output power. Vulnerability allows attacker to create an arbitrary amount of ssid wlans interface per radio which creates overhead over noise (the default max limit is 8 ssid only per radio in solo AP). Vulnerability allows attacker to unlock hidden regions by privilege command injection in WEB GUI." }, { "lang": "es", "value": "En Ruckus R310 10.5.1.0.199, Ruckus R500 10.5.1.0.199, Ruckus R600 10.5.1.0.199, Ruckus T300 10.5.1.0.199, Ruckus T301n 10.5.1.0.199, Ruckus T301s 10.5.1.0 .199, celda inteligente Gateway 200 (SCG200) anterior a 3.6.2.0.795, SmartZone 100 (SZ-100) anterior a 3.6.2.0.795, SmartZone 300 (SZ300) anterior a 3.6.2.0.795, Virtual SmartZone (vSZ) anterior a 3.6.2.0.795, ZoneDirector 1100 9.10.2.0.130, ZoneDirector 1200 10.2.1.0.218, ZoneDirector 3000 10.2.1.0.218, ZoneDirector 5000 10.0.1.0.151, una vulnerabilidad permite a los atacantes cambiar y establecer un \"c\u00f3digo de regi\u00f3n ilegal\" no autorizado mediante ejecuci\u00f3n remota de c\u00f3digo Inyecci\u00f3n de comando que conduce a una frecuencia ilegal con m\u00e1xima potencia de salida. Esta vulnerabilidad permite al atacante crear una cantidad arbitraria de interfaz WLAN ssid por radio, lo que genera una sobrecarga de ruido (el l\u00edmite m\u00e1ximo predeterminado es 8 ssid solo por radio en AP solo). La vulnerabilidad permite al atacante desbloquear regiones ocultas mediante la inyecci\u00f3n de comandos de privilegios en la GUI WEB. " } ], "id": "CVE-2020-22662", "lastModified": "2025-04-03T18:15:40.630", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2023-01-20T19:15:13.063", "references": [ { "source": "cve@mitre.org", "url": "https://hdhrmi.blogspot.com/2020/03/multiple-vulnerabilities-in-ruckus.html?m=1" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://support.ruckuswireless.com/security_bulletins/302" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://support.ruckuswireless.com/security_bulletins/302" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-77" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-77" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2023-01-20 19:15
Modified
2025-04-03 18:15
Severity ?
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Summary
In Ruckus R310 10.5.1.0.199, Ruckus R500 10.5.1.0.199, Ruckus R600 10.5.1.0.199, Ruckus T300 10.5.1.0.199, Ruckus T301n 10.5.1.0.199, Ruckus T301s 10.5.1.0.199, SmartCell Gateway 200 (SCG200) before 3.6.2.0.795, SmartZone 100 (SZ-100) before 3.6.2.0.795, SmartZone 300 (SZ300) before 3.6.2.0.795, Virtual SmartZone (vSZ) before 3.6.2.0.795, ZoneDirector 1100 9.10.2.0.130, ZoneDirector 1200 10.2.1.0.218, ZoneDirector 3000 10.2.1.0.218, ZoneDirector 5000 10.0.1.0.151, a vulnerability allows attackers to persistently to writing unauthorized image.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ruckuswireless | r310_firmware | 10.5.1.0.199 | |
ruckuswireless | r310 | - | |
ruckuswireless | r500_firmware | 10.5.1.0.199 | |
ruckuswireless | r500 | - | |
ruckuswireless | r600_firmware | 10.5.1.0.199 | |
ruckuswireless | r600 | - | |
ruckuswireless | t300_firmware | 10.5.1.0.199 | |
ruckuswireless | t300 | - | |
ruckuswireless | t301n_firmware | 10.5.1.0.199 | |
ruckuswireless | t301n | - | |
ruckuswireless | t301s_firmware | 10.5.1.0.199 | |
ruckuswireless | t301s | - | |
ruckuswireless | scg200_firmware | * | |
ruckuswireless | scg200 | - | |
ruckuswireless | sz-100_firmware | * | |
ruckuswireless | sz-100 | - | |
ruckuswireless | sz-300_firmware | * | |
ruckuswireless | sz-300 | - | |
ruckuswireless | vsz_firmware | * | |
ruckuswireless | vsz | - | |
ruckuswireless | zonedirector_1100_firmware | 9.10.2.0.130 | |
ruckuswireless | zonedirector_1100 | - | |
ruckuswireless | zonedirector_1200_firmware | 10.2.1.0.218 | |
ruckuswireless | zonedirector_1200 | - | |
ruckuswireless | zonedirector_3000_firmware | 10.2.1.0.218 | |
ruckuswireless | zonedirector_3000 | - | |
ruckuswireless | zonedirector_5000_firmware | 10.0.1.0.151 | |
ruckuswireless | zonedirector_5000 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:r310_firmware:10.5.1.0.199:*:*:*:*:*:*:*", "matchCriteriaId": "5ED8801F-2B0B-480D-876D-9F662B995851", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:r310:-:*:*:*:*:*:*:*", "matchCriteriaId": "40D3129E-4C02-484F-96B6-59D76F787D21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:r500_firmware:10.5.1.0.199:*:*:*:*:*:*:*", "matchCriteriaId": "E54CB15F-CA79-403B-A1B1-B7832B65EEC3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:r500:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BBDBE9C-BE4B-4ED6-AF62-8FE484C519E2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:r600_firmware:10.5.1.0.199:*:*:*:*:*:*:*", "matchCriteriaId": "27E05347-1CFD-46FC-999A-90E6C40CEE26", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:r600:-:*:*:*:*:*:*:*", "matchCriteriaId": "5421B1D7-E630-4BDA-BA34-7DD8D0738DF4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:t300_firmware:10.5.1.0.199:*:*:*:*:*:*:*", "matchCriteriaId": "5D91278C-B07E-44FF-ABBA-10E8B5830FFA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:t300:-:*:*:*:*:*:*:*", "matchCriteriaId": "0511674E-59A6-427C-A265-B277D84DE301", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:t301n_firmware:10.5.1.0.199:*:*:*:*:*:*:*", "matchCriteriaId": "E0412E29-6DB5-4C01-B8C3-702EB7EBE8DE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:t301n:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBB7A43E-F5F1-465A-841F-05214EDA6833", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:t301s_firmware:10.5.1.0.199:*:*:*:*:*:*:*", "matchCriteriaId": "6DAA3771-2795-403D-8506-C155403C8B7C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:t301s:-:*:*:*:*:*:*:*", "matchCriteriaId": "68C4D9AC-5B1C-4066-8216-3F7127C3CC64", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:scg200_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "775F1067-344F-49AD-9901-97D2F1AC5F0F", "versionEndExcluding": "3.6.2.0.795", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:scg200:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6FB3968-8D8A-4D04-B3D1-18A28CA8C249", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:sz-100_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "46BCF71C-8A66-45C8-B1ED-8957B670CBF5", "versionEndExcluding": "3.6.2.0.795", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:sz-100:-:*:*:*:*:*:*:*", "matchCriteriaId": "3B9F3E41-79CA-45B7-B799-B0A64E60BA16", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:sz-300_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7CEA2295-79BE-4728-8BF2-DEAB2BCAA0E5", "versionEndExcluding": "3.6.2.0.795", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:sz-300:-:*:*:*:*:*:*:*", "matchCriteriaId": "4087D2FB-0853-40AE-A03F-803B5972A404", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:vsz_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B3E5690D-7955-4E12-AE51-C3CDAD596096", "versionEndExcluding": "3.6.2.0.795", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:vsz:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1E9A46B-D8E4-489A-8648-28EDDF000E28", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:zonedirector_1100_firmware:9.10.2.0.130:*:*:*:*:*:*:*", "matchCriteriaId": "76872953-AA21-41F1-832E-5CD04CA0FF9A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:zonedirector_1100:-:*:*:*:*:*:*:*", "matchCriteriaId": "CF376AF6-E73A-425B-8E31-36330D8FEB73", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:zonedirector_1200_firmware:10.2.1.0.218:*:*:*:*:*:*:*", "matchCriteriaId": "83AD20A3-C56E-4436-A9CC-29884EF9EB67", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:zonedirector_1200:-:*:*:*:*:*:*:*", "matchCriteriaId": "0FE0C2B2-D14B-4798-95C4-F911B3B1D88E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:zonedirector_3000_firmware:10.2.1.0.218:*:*:*:*:*:*:*", "matchCriteriaId": "86A26EBE-4077-4DE7-BC6C-D38F5A3D3E7B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:zonedirector_3000:-:*:*:*:*:*:*:*", "matchCriteriaId": "5A1F42A8-8785-48A5-B0B0-68504EFD38B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:zonedirector_5000_firmware:10.0.1.0.151:*:*:*:*:*:*:*", "matchCriteriaId": "04D53E59-6431-4ED3-BA0B-E54B2FBCDE0D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:zonedirector_5000:-:*:*:*:*:*:*:*", "matchCriteriaId": "1DA49DE5-DA7F-4531-9ACF-353561DA90E4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Ruckus R310 10.5.1.0.199, Ruckus R500 10.5.1.0.199, Ruckus R600 10.5.1.0.199, Ruckus T300 10.5.1.0.199, Ruckus T301n 10.5.1.0.199, Ruckus T301s 10.5.1.0.199, SmartCell Gateway 200 (SCG200) before 3.6.2.0.795, SmartZone 100 (SZ-100) before 3.6.2.0.795, SmartZone 300 (SZ300) before 3.6.2.0.795, Virtual SmartZone (vSZ) before 3.6.2.0.795, ZoneDirector 1100 9.10.2.0.130, ZoneDirector 1200 10.2.1.0.218, ZoneDirector 3000 10.2.1.0.218, ZoneDirector 5000 10.0.1.0.151, a vulnerability allows attackers to persistently to writing unauthorized image." }, { "lang": "es", "value": "En Ruckus R310 10.5.1.0.199, Ruckus R500 10.5.1.0.199, Ruckus R600 10.5.1.0.199, Ruckus T300 10.5.1.0.199, Ruckus T301n 10.5.1.0.199, Ruckus T301s 10.5.1.0 .199, celda inteligente Gateway 200 (SCG200) anterior a 3.6.2.0.795, SmartZone 100 (SZ-100) anterior a 3.6.2.0.795, SmartZone 300 (SZ300) anterior a 3.6.2.0.795, Virtual SmartZone (vSZ) anterior a 3.6.2.0.795, ZoneDirector 1100 9.10.2.0.130, ZoneDirector 1200 10.2.1.0.218, ZoneDirector 3000 10.2.1.0.218, ZoneDirector 5000 10.0.1.0.151, una vulnerabilidad permite a los atacantes escribir de forma persistente im\u00e1genes no autorizadas." } ], "id": "CVE-2020-22655", "lastModified": "2025-04-03T18:15:39.303", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2023-01-20T19:15:12.667", "references": [ { "source": "cve@mitre.org", "url": "https://hdhrmi.blogspot.com/2020/03/multiple-vulnerabilities-in-ruckus.html?m=1" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://support.ruckuswireless.com/security_bulletins/302" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://support.ruckuswireless.com/security_bulletins/302" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-284" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2018-02-14 19:29
Modified
2024-11-21 03:29
Severity ?
Summary
Ruckus Networks Unleashed AP firmware releases before 200.6.10.1.x and Ruckus Networks Zone Director firmware releases 10.1.0.0.x, 9.10.2.0.x, 9.12.3.0.x, 9.13.3.0.x, 10.0.1.0.x or before contain authenticated Root Command Injection in the CLI that could allow authenticated valid users to execute privileged commands on the respective systems.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:r500_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7842F7BA-DB75-44BA-A505-03AC07443F55", "versionEndExcluding": "200.6.10.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:r500:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BBDBE9C-BE4B-4ED6-AF62-8FE484C519E2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:r600_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "01AEB940-2D3C-4F8A-B2D2-075665F893EC", "versionEndExcluding": "200.6.10.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:r600:-:*:*:*:*:*:*:*", "matchCriteriaId": "5421B1D7-E630-4BDA-BA34-7DD8D0738DF4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:r310_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "08795F10-C276-4A7D-83FD-C39A8844D854", "versionEndExcluding": "200.6.10.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:r310:-:*:*:*:*:*:*:*", "matchCriteriaId": "40D3129E-4C02-484F-96B6-59D76F787D21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:h320_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2B282766-1ACE-4249-99CB-CF8DD099EBDC", "versionEndExcluding": "200.6.10.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:h320:-:*:*:*:*:*:*:*", "matchCriteriaId": "282C3A1D-711C-4415-B9BE-A9B518204AEB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:h510_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "01348379-0624-46A2-B0EF-8877A6CBB8B6", "versionEndExcluding": "200.6.10.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:h510:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB1FAB48-786A-4FB3-AB6D-3118E94E68C7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:r710_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "61041E50-BDB8-431E-959F-BA6BF734F889", "versionEndExcluding": "200.6.10.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:r710:-:*:*:*:*:*:*:*", "matchCriteriaId": "E95884E9-C6AF-4106-A178-9274AD27EF65", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:r720_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F40E9FA2-CAD7-43E4-AACC-6E61B5D3B41C", "versionEndExcluding": "200.6.10.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:r720:-:*:*:*:*:*:*:*", "matchCriteriaId": "DDFDAF0A-9F5D-4E34-805E-6F27103AAA32", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:t300_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "ACA58F89-2F73-42A6-AF00-BD17275650EA", "versionEndExcluding": "200.6.10.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:t300:-:*:*:*:*:*:*:*", "matchCriteriaId": "0511674E-59A6-427C-A265-B277D84DE301", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:t301_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F5B07FA9-7E5A-4429-A4F6-B2AD1AB89388", "versionEndExcluding": "200.6.10.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:t301:-:*:*:*:*:*:*:*", "matchCriteriaId": "7FFEA172-9781-4FA8-96F2-DE09FB6340FE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:t300e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3FAD7213-2C06-4B24-8E36-9D5EE2B32720", "versionEndExcluding": "200.6.10.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:t300e:-:*:*:*:*:*:*:*", "matchCriteriaId": "787156EB-F6AA-445F-8B56-4C3696E08697", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:t610_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0395ED7F-AE77-4FF3-A139-718956FA13A7", "versionEndExcluding": "200.6.10.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:t610:-:*:*:*:*:*:*:*", "matchCriteriaId": "210D55AB-9305-4D0B-B9F0-47889D37373B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:t710_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A02D3DD9-5369-45E4-84BE-678EC3DDDAC4", "versionEndExcluding": "200.6.10.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:t710:-:*:*:*:*:*:*:*", "matchCriteriaId": "862672CC-0480-405C-9791-8993D19931A2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:r510_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6248C61C-ED6C-42AC-8B0D-DF197BF1107D", "versionEndExcluding": "200.6.10.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:r510:-:*:*:*:*:*:*:*", "matchCriteriaId": "80B2E8CC-EACE-4A80-9EB1-DADAB8034415", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:zonedirector_1200_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BA60F3C8-CF88-4336-A214-98292E45B39D", "versionEndIncluding": "9.10.2.0.53", "versionStartIncluding": "9.10.2.0.11", "vulnerable": true }, { "criteria": "cpe:2.3:o:ruckuswireless:zonedirector_1200_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "87A7791C-AD3E-433E-9383-69BCC6F1A91F", "versionEndIncluding": "9.12.3.0.83", "versionStartIncluding": "9.12.3.0.28", "vulnerable": true }, { "criteria": "cpe:2.3:o:ruckuswireless:zonedirector_1200_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "882D995A-9677-46BD-BF59-91DDAA4C73F6", "versionEndIncluding": "9.13.3.0.145", "versionStartIncluding": "9.13.3.0.22", "vulnerable": true }, { "criteria": "cpe:2.3:o:ruckuswireless:zonedirector_1200_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AB97CF78-F5A4-4BEE-B447-4E27CE05022B", "versionEndIncluding": "10.0.1.0.44", "versionStartIncluding": "10.0.1.0.17", "vulnerable": true }, { "criteria": "cpe:2.3:o:ruckuswireless:zonedirector_1200_firmware:10.1.0.0.1515:*:*:*:*:*:*:*", "matchCriteriaId": "E832AD5B-50F7-4BB1-9116-33B67286D197", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:zonedirector_1200:-:*:*:*:*:*:*:*", "matchCriteriaId": "0FE0C2B2-D14B-4798-95C4-F911B3B1D88E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:zonedirector_3000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E3DBB4B6-0ED3-425A-AB4A-B8B76521312F", "versionEndIncluding": "9.10.2.0.53", "versionStartIncluding": "9.10.2.0.11", "vulnerable": true }, { "criteria": "cpe:2.3:o:ruckuswireless:zonedirector_3000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "77C9E693-D648-4636-97E0-62B819DDB9CB", "versionEndIncluding": "9.12.3.0.83", "versionStartIncluding": "9.12.3.0.28", "vulnerable": true }, { "criteria": "cpe:2.3:o:ruckuswireless:zonedirector_3000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CC11B771-8CB6-4009-861F-0AC6CA0519C1", "versionEndIncluding": "9.13.3.0.145", "versionStartIncluding": "9.13.3.0.22", "vulnerable": true }, { "criteria": "cpe:2.3:o:ruckuswireless:zonedirector_3000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "26F9F52E-11E2-4995-AA03-F0AC4F33D0C9", "versionEndIncluding": "10.0.1.0.44", "versionStartIncluding": "10.0.1.0.17", "vulnerable": true }, { "criteria": "cpe:2.3:o:ruckuswireless:zonedirector_3000_firmware:10.1.0.0.1515:*:*:*:*:*:*:*", "matchCriteriaId": "A8636729-51EA-4292-8477-C78C11C5A8AC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:zonedirector_3000:-:*:*:*:*:*:*:*", "matchCriteriaId": "5A1F42A8-8785-48A5-B0B0-68504EFD38B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Ruckus Networks Unleashed AP firmware releases before 200.6.10.1.x and Ruckus Networks Zone Director firmware releases 10.1.0.0.x, 9.10.2.0.x, 9.12.3.0.x, 9.13.3.0.x, 10.0.1.0.x or before contain authenticated Root Command Injection in the CLI that could allow authenticated valid users to execute privileged commands on the respective systems." }, { "lang": "es", "value": "Ruckus Networks Unleashed AP, en versiones de firmware anteriores a 200.6.10.1.x y Ruckus Networks Zone Director, en versiones de firmware 10.1.0.0.x, 9.10.2.0.x, 9.12.3.0.x, 9.13.3.0.x y 10.0.1.0.x o anteriores, contienen inyecci\u00f3n de comandos root autenticados en la interfaz de l\u00ednea de comandos que podr\u00edan permitir que usuarios autenticados v\u00e1lidos ejecuten comandos privilegiados en los respectivos sistemas." } ], "id": "CVE-2017-6229", "lastModified": "2024-11-21T03:29:18.477", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-02-14T19:29:00.213", "references": [ { "source": "sirt@brocade.com", "tags": [ "Vendor Advisory" ], "url": "https://ruckus-www.s3.amazonaws.com/pdf/security/faq-security-advisory-id-20180202-v1.0.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://ruckus-www.s3.amazonaws.com/pdf/security/faq-security-advisory-id-20180202-v1.0.txt" } ], "sourceIdentifier": "sirt@brocade.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-01-20 19:15
Modified
2025-04-03 18:15
Severity ?
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Summary
In Ruckus R310 10.5.1.0.199, Ruckus R500 10.5.1.0.199, Ruckus R600 10.5.1.0.199, Ruckus T300 10.5.1.0.199, Ruckus T301n 10.5.1.0.199, Ruckus T301s 10.5.1.0.199, SmartCell Gateway 200 (SCG200) before 3.6.2.0.795, SmartZone 100 (SZ-100) before 3.6.2.0.795, SmartZone 300 (SZ300) before 3.6.2.0.795, Virtual SmartZone (vSZ) before 3.6.2.0.795, ZoneDirector 1100 9.10.2.0.130, ZoneDirector 1200 10.2.1.0.218, ZoneDirector 3000 10.2.1.0.218, ZoneDirector 5000 10.0.1.0.151, a vulnerability allows attackers to make the Secure Boot in failed attempts state (rfwd).
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ruckuswireless | r310_firmware | 10.5.1.0.199 | |
ruckuswireless | r310 | - | |
ruckuswireless | r500_firmware | 10.5.1.0.199 | |
ruckuswireless | r500 | - | |
ruckuswireless | r600_firmware | 10.5.1.0.199 | |
ruckuswireless | r600 | - | |
ruckuswireless | t300_firmware | 10.5.1.0.199 | |
ruckuswireless | t300 | - | |
ruckuswireless | t301n_firmware | 10.5.1.0.199 | |
ruckuswireless | t301n | - | |
ruckuswireless | t301s_firmware | 10.5.1.0.199 | |
ruckuswireless | t301s | - | |
ruckuswireless | scg200_firmware | * | |
ruckuswireless | scg200 | - | |
ruckuswireless | sz-100_firmware | * | |
ruckuswireless | sz-100 | - | |
ruckuswireless | sz-300_firmware | * | |
ruckuswireless | sz-300 | - | |
ruckuswireless | vsz_firmware | * | |
ruckuswireless | vsz | - | |
ruckuswireless | zonedirector_1100_firmware | 9.10.2.0.130 | |
ruckuswireless | zonedirector_1100 | - | |
ruckuswireless | zonedirector_1200_firmware | 10.2.1.0.218 | |
ruckuswireless | zonedirector_1200 | - | |
ruckuswireless | zonedirector_3000_firmware | 10.2.1.0.218 | |
ruckuswireless | zonedirector_3000 | - | |
ruckuswireless | zonedirector_5000_firmware | 10.0.1.0.151 | |
ruckuswireless | zonedirector_5000 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:r310_firmware:10.5.1.0.199:*:*:*:*:*:*:*", "matchCriteriaId": "5ED8801F-2B0B-480D-876D-9F662B995851", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:r310:-:*:*:*:*:*:*:*", "matchCriteriaId": "40D3129E-4C02-484F-96B6-59D76F787D21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:r500_firmware:10.5.1.0.199:*:*:*:*:*:*:*", "matchCriteriaId": "E54CB15F-CA79-403B-A1B1-B7832B65EEC3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:r500:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BBDBE9C-BE4B-4ED6-AF62-8FE484C519E2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:r600_firmware:10.5.1.0.199:*:*:*:*:*:*:*", "matchCriteriaId": "27E05347-1CFD-46FC-999A-90E6C40CEE26", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:r600:-:*:*:*:*:*:*:*", "matchCriteriaId": "5421B1D7-E630-4BDA-BA34-7DD8D0738DF4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:t300_firmware:10.5.1.0.199:*:*:*:*:*:*:*", "matchCriteriaId": "5D91278C-B07E-44FF-ABBA-10E8B5830FFA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:t300:-:*:*:*:*:*:*:*", "matchCriteriaId": "0511674E-59A6-427C-A265-B277D84DE301", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:t301n_firmware:10.5.1.0.199:*:*:*:*:*:*:*", "matchCriteriaId": "E0412E29-6DB5-4C01-B8C3-702EB7EBE8DE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:t301n:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBB7A43E-F5F1-465A-841F-05214EDA6833", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:t301s_firmware:10.5.1.0.199:*:*:*:*:*:*:*", "matchCriteriaId": "6DAA3771-2795-403D-8506-C155403C8B7C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:t301s:-:*:*:*:*:*:*:*", "matchCriteriaId": "68C4D9AC-5B1C-4066-8216-3F7127C3CC64", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:scg200_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "775F1067-344F-49AD-9901-97D2F1AC5F0F", "versionEndExcluding": "3.6.2.0.795", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:scg200:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6FB3968-8D8A-4D04-B3D1-18A28CA8C249", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:sz-100_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "46BCF71C-8A66-45C8-B1ED-8957B670CBF5", "versionEndExcluding": "3.6.2.0.795", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:sz-100:-:*:*:*:*:*:*:*", "matchCriteriaId": "3B9F3E41-79CA-45B7-B799-B0A64E60BA16", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:sz-300_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7CEA2295-79BE-4728-8BF2-DEAB2BCAA0E5", "versionEndExcluding": "3.6.2.0.795", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:sz-300:-:*:*:*:*:*:*:*", "matchCriteriaId": "4087D2FB-0853-40AE-A03F-803B5972A404", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:vsz_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B3E5690D-7955-4E12-AE51-C3CDAD596096", "versionEndExcluding": "3.6.2.0.795", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:vsz:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1E9A46B-D8E4-489A-8648-28EDDF000E28", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:zonedirector_1100_firmware:9.10.2.0.130:*:*:*:*:*:*:*", "matchCriteriaId": "76872953-AA21-41F1-832E-5CD04CA0FF9A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:zonedirector_1100:-:*:*:*:*:*:*:*", "matchCriteriaId": "CF376AF6-E73A-425B-8E31-36330D8FEB73", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:zonedirector_1200_firmware:10.2.1.0.218:*:*:*:*:*:*:*", "matchCriteriaId": "83AD20A3-C56E-4436-A9CC-29884EF9EB67", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:zonedirector_1200:-:*:*:*:*:*:*:*", "matchCriteriaId": "0FE0C2B2-D14B-4798-95C4-F911B3B1D88E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:zonedirector_3000_firmware:10.2.1.0.218:*:*:*:*:*:*:*", "matchCriteriaId": "86A26EBE-4077-4DE7-BC6C-D38F5A3D3E7B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:zonedirector_3000:-:*:*:*:*:*:*:*", "matchCriteriaId": "5A1F42A8-8785-48A5-B0B0-68504EFD38B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:zonedirector_5000_firmware:10.0.1.0.151:*:*:*:*:*:*:*", "matchCriteriaId": "04D53E59-6431-4ED3-BA0B-E54B2FBCDE0D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:zonedirector_5000:-:*:*:*:*:*:*:*", "matchCriteriaId": "1DA49DE5-DA7F-4531-9ACF-353561DA90E4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Ruckus R310 10.5.1.0.199, Ruckus R500 10.5.1.0.199, Ruckus R600 10.5.1.0.199, Ruckus T300 10.5.1.0.199, Ruckus T301n 10.5.1.0.199, Ruckus T301s 10.5.1.0.199, SmartCell Gateway 200 (SCG200) before 3.6.2.0.795, SmartZone 100 (SZ-100) before 3.6.2.0.795, SmartZone 300 (SZ300) before 3.6.2.0.795, Virtual SmartZone (vSZ) before 3.6.2.0.795, ZoneDirector 1100 9.10.2.0.130, ZoneDirector 1200 10.2.1.0.218, ZoneDirector 3000 10.2.1.0.218, ZoneDirector 5000 10.0.1.0.151, a vulnerability allows attackers to make the Secure Boot in failed attempts state (rfwd)." }, { "lang": "es", "value": "En Ruckus R310 10.5.1.0.199, Ruckus R500 10.5.1.0.199, Ruckus R600 10.5.1.0.199, Ruckus T300 10.5.1.0.199, Ruckus T301n 10.5.1.0.199, Ruckus T301s 10.5.1.0 .199, celda inteligente Gateway 200 (SCG200) anterior a 3.6.2.0.795, SmartZone 100 (SZ-100) anterior a 3.6.2.0.795, SmartZone 300 (SZ300) anterior a 3.6.2.0.795, Virtual SmartZone (vSZ) anterior a 3.6.2.0.795, ZoneDirector 1100 9.10.2.0.130, ZoneDirector 1200 10.2.1.0.218, ZoneDirector 3000 10.2.1.0.218, ZoneDirector 5000 10.0.1.0.151, una vulnerabilidad permite a atacantes realizar el arranque seguro en estado de intentos fallidos (rfwd)." } ], "id": "CVE-2020-22656", "lastModified": "2025-04-03T18:15:39.513", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2023-01-20T19:15:12.720", "references": [ { "source": "cve@mitre.org", "url": "https://hdhrmi.blogspot.com/2020/03/multiple-vulnerabilities-in-ruckus.html?m=1" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://support.ruckuswireless.com/security_bulletins/302" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://support.ruckuswireless.com/security_bulletins/302" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-1272" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2023-01-20 19:15
Modified
2025-04-03 18:15
Severity ?
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
In Ruckus R310 10.5.1.0.199, Ruckus R500 10.5.1.0.199, Ruckus R600 10.5.1.0.199, Ruckus T300 10.5.1.0.199, Ruckus T301n 10.5.1.0.199, Ruckus T301s 10.5.1.0.199, SmartCell Gateway 200 (SCG200) before 3.6.2.0.795, SmartZone 100 (SZ-100) before 3.6.2.0.795, SmartZone 300 (SZ300) before 3.6.2.0.795, Virtual SmartZone (vSZ) before 3.6.2.0.795, ZoneDirector 1100 9.10.2.0.130, ZoneDirector 1200 10.2.1.0.218, ZoneDirector 3000 10.2.1.0.218, ZoneDirector 5000 10.0.1.0.151, a vulnerability allows attackers to bypass firmware image bad md5 checksum failed error.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ruckuswireless | r310_firmware | 10.5.1.0.199 | |
ruckuswireless | r310 | - | |
ruckuswireless | r500_firmware | 10.5.1.0.199 | |
ruckuswireless | r500 | - | |
ruckuswireless | r600_firmware | 10.5.1.0.199 | |
ruckuswireless | r600 | - | |
ruckuswireless | t300_firmware | 10.5.1.0.199 | |
ruckuswireless | t300 | - | |
ruckuswireless | t301n_firmware | 10.5.1.0.199 | |
ruckuswireless | t301n | - | |
ruckuswireless | t301s_firmware | 10.5.1.0.199 | |
ruckuswireless | t301s | - | |
ruckuswireless | scg200_firmware | * | |
ruckuswireless | scg200 | - | |
ruckuswireless | sz-100_firmware | * | |
ruckuswireless | sz-100 | - | |
ruckuswireless | sz-300_firmware | * | |
ruckuswireless | sz-300 | - | |
ruckuswireless | vsz_firmware | * | |
ruckuswireless | vsz | - | |
ruckuswireless | zonedirector_1100_firmware | 9.10.2.0.130 | |
ruckuswireless | zonedirector_1100 | - | |
ruckuswireless | zonedirector_1200_firmware | 10.2.1.0.218 | |
ruckuswireless | zonedirector_1200 | - | |
ruckuswireless | zonedirector_3000_firmware | 10.2.1.0.218 | |
ruckuswireless | zonedirector_3000 | - | |
ruckuswireless | zonedirector_5000_firmware | 10.0.1.0.151 | |
ruckuswireless | zonedirector_5000 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:r310_firmware:10.5.1.0.199:*:*:*:*:*:*:*", "matchCriteriaId": "5ED8801F-2B0B-480D-876D-9F662B995851", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:r310:-:*:*:*:*:*:*:*", "matchCriteriaId": "40D3129E-4C02-484F-96B6-59D76F787D21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:r500_firmware:10.5.1.0.199:*:*:*:*:*:*:*", "matchCriteriaId": "E54CB15F-CA79-403B-A1B1-B7832B65EEC3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:r500:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BBDBE9C-BE4B-4ED6-AF62-8FE484C519E2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:r600_firmware:10.5.1.0.199:*:*:*:*:*:*:*", "matchCriteriaId": "27E05347-1CFD-46FC-999A-90E6C40CEE26", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:r600:-:*:*:*:*:*:*:*", "matchCriteriaId": "5421B1D7-E630-4BDA-BA34-7DD8D0738DF4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:t300_firmware:10.5.1.0.199:*:*:*:*:*:*:*", "matchCriteriaId": "5D91278C-B07E-44FF-ABBA-10E8B5830FFA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:t300:-:*:*:*:*:*:*:*", "matchCriteriaId": "0511674E-59A6-427C-A265-B277D84DE301", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:t301n_firmware:10.5.1.0.199:*:*:*:*:*:*:*", "matchCriteriaId": "E0412E29-6DB5-4C01-B8C3-702EB7EBE8DE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:t301n:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBB7A43E-F5F1-465A-841F-05214EDA6833", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:t301s_firmware:10.5.1.0.199:*:*:*:*:*:*:*", "matchCriteriaId": "6DAA3771-2795-403D-8506-C155403C8B7C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:t301s:-:*:*:*:*:*:*:*", "matchCriteriaId": "68C4D9AC-5B1C-4066-8216-3F7127C3CC64", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:scg200_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "775F1067-344F-49AD-9901-97D2F1AC5F0F", "versionEndExcluding": "3.6.2.0.795", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:scg200:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6FB3968-8D8A-4D04-B3D1-18A28CA8C249", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:sz-100_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "46BCF71C-8A66-45C8-B1ED-8957B670CBF5", "versionEndExcluding": "3.6.2.0.795", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:sz-100:-:*:*:*:*:*:*:*", "matchCriteriaId": "3B9F3E41-79CA-45B7-B799-B0A64E60BA16", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:sz-300_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7CEA2295-79BE-4728-8BF2-DEAB2BCAA0E5", "versionEndExcluding": "3.6.2.0.795", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:sz-300:-:*:*:*:*:*:*:*", "matchCriteriaId": "4087D2FB-0853-40AE-A03F-803B5972A404", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:vsz_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B3E5690D-7955-4E12-AE51-C3CDAD596096", "versionEndExcluding": "3.6.2.0.795", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:vsz:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1E9A46B-D8E4-489A-8648-28EDDF000E28", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:zonedirector_1100_firmware:9.10.2.0.130:*:*:*:*:*:*:*", "matchCriteriaId": "76872953-AA21-41F1-832E-5CD04CA0FF9A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:zonedirector_1100:-:*:*:*:*:*:*:*", "matchCriteriaId": "CF376AF6-E73A-425B-8E31-36330D8FEB73", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:zonedirector_1200_firmware:10.2.1.0.218:*:*:*:*:*:*:*", "matchCriteriaId": "83AD20A3-C56E-4436-A9CC-29884EF9EB67", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:zonedirector_1200:-:*:*:*:*:*:*:*", "matchCriteriaId": "0FE0C2B2-D14B-4798-95C4-F911B3B1D88E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:zonedirector_3000_firmware:10.2.1.0.218:*:*:*:*:*:*:*", "matchCriteriaId": "86A26EBE-4077-4DE7-BC6C-D38F5A3D3E7B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:zonedirector_3000:-:*:*:*:*:*:*:*", "matchCriteriaId": "5A1F42A8-8785-48A5-B0B0-68504EFD38B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:zonedirector_5000_firmware:10.0.1.0.151:*:*:*:*:*:*:*", "matchCriteriaId": "04D53E59-6431-4ED3-BA0B-E54B2FBCDE0D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:zonedirector_5000:-:*:*:*:*:*:*:*", "matchCriteriaId": "1DA49DE5-DA7F-4531-9ACF-353561DA90E4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Ruckus R310 10.5.1.0.199, Ruckus R500 10.5.1.0.199, Ruckus R600 10.5.1.0.199, Ruckus T300 10.5.1.0.199, Ruckus T301n 10.5.1.0.199, Ruckus T301s 10.5.1.0.199, SmartCell Gateway 200 (SCG200) before 3.6.2.0.795, SmartZone 100 (SZ-100) before 3.6.2.0.795, SmartZone 300 (SZ300) before 3.6.2.0.795, Virtual SmartZone (vSZ) before 3.6.2.0.795, ZoneDirector 1100 9.10.2.0.130, ZoneDirector 1200 10.2.1.0.218, ZoneDirector 3000 10.2.1.0.218, ZoneDirector 5000 10.0.1.0.151, a vulnerability allows attackers to bypass firmware image bad md5 checksum failed error." }, { "lang": "es", "value": "En Ruckus R310 10.5.1.0.199, Ruckus R500 10.5.1.0.199, Ruckus R600 10.5.1.0.199, Ruckus T300 10.5.1.0.199, Ruckus T301n 10.5.1.0.199, Ruckus T301s 10.5.1.0 .199, SmartCell Gateway 200 (SCG200) anterior a 3.6.2.0.795, SmartZone 100 (SZ-100) anterior a 3.6.2.0.795, SmartZone 300 (SZ300) anterior a 3.6.2.0.795, Virtual SmartZone (vSZ) anterior a 3.6.2.0.795, ZoneDirector 1100 9.10.2.0.130, ZoneDirector 1200 10.2.1.0.218, ZoneDirector 3000 10.2.1.0.218, ZoneDirector 5000 10.0.1.0.151, una vulnerabilidad permite a los atacantes evitar el error de suma de comprobaci\u00f3n md5 incorrecta de la imagen del firmware." } ], "id": "CVE-2020-22654", "lastModified": "2025-04-03T18:15:39.100", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2023-01-20T19:15:12.610", "references": [ { "source": "cve@mitre.org", "url": "https://hdhrmi.blogspot.com/2020/03/multiple-vulnerabilities-in-ruckus.html?m=1" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://support.ruckuswireless.com/security_bulletins/302" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://support.ruckuswireless.com/security_bulletins/302" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-494" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2023-01-20 19:15
Modified
2025-04-03 18:15
Severity ?
9.1 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
9.1 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
9.1 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Summary
In Ruckus R310 10.5.1.0.199, Ruckus R500 10.5.1.0.199, Ruckus R600 10.5.1.0.199, Ruckus T300 10.5.1.0.199, Ruckus T301n 10.5.1.0.199, Ruckus T301s 10.5.1.0.199, SmartCell Gateway 200 (SCG200) before 3.6.2.0.795, SmartZone 100 (SZ-100) before 3.6.2.0.795, SmartZone 300 (SZ300) before 3.6.2.0.795, Virtual SmartZone (vSZ) before 3.6.2.0.795, ZoneDirector 1100 9.10.2.0.130, ZoneDirector 1200 10.2.1.0.218, ZoneDirector 3000 10.2.1.0.218, ZoneDirector 5000 10.0.1.0.151, a vulnerability allows attackers to perform WEB GUI login authentication bypass.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ruckuswireless | r310_firmware | 10.5.1.0.199 | |
ruckuswireless | r310 | - | |
ruckuswireless | r500_firmware | 10.5.1.0.199 | |
ruckuswireless | r500 | - | |
ruckuswireless | r600_firmware | 10.5.1.0.199 | |
ruckuswireless | r600 | - | |
ruckuswireless | t300_firmware | 10.5.1.0.199 | |
ruckuswireless | t300 | - | |
ruckuswireless | t301n_firmware | 10.5.1.0.199 | |
ruckuswireless | t301n | - | |
ruckuswireless | t301s_firmware | 10.5.1.0.199 | |
ruckuswireless | t301s | - | |
ruckuswireless | scg200_firmware | * | |
ruckuswireless | scg200 | - | |
ruckuswireless | sz-100_firmware | * | |
ruckuswireless | sz-100 | - | |
ruckuswireless | sz-300_firmware | * | |
ruckuswireless | sz-300 | - | |
ruckuswireless | vsz_firmware | * | |
ruckuswireless | vsz | - | |
ruckuswireless | zonedirector_1100_firmware | 9.10.2.0.130 | |
ruckuswireless | zonedirector_1100 | - | |
ruckuswireless | zonedirector_1200_firmware | 10.2.1.0.218 | |
ruckuswireless | zonedirector_1200 | - | |
ruckuswireless | zonedirector_3000_firmware | 10.2.1.0.218 | |
ruckuswireless | zonedirector_3000 | - | |
ruckuswireless | zonedirector_5000_firmware | 10.0.1.0.151 | |
ruckuswireless | zonedirector_5000 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:r310_firmware:10.5.1.0.199:*:*:*:*:*:*:*", "matchCriteriaId": "5ED8801F-2B0B-480D-876D-9F662B995851", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:r310:-:*:*:*:*:*:*:*", "matchCriteriaId": "40D3129E-4C02-484F-96B6-59D76F787D21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:r500_firmware:10.5.1.0.199:*:*:*:*:*:*:*", "matchCriteriaId": "E54CB15F-CA79-403B-A1B1-B7832B65EEC3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:r500:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BBDBE9C-BE4B-4ED6-AF62-8FE484C519E2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:r600_firmware:10.5.1.0.199:*:*:*:*:*:*:*", "matchCriteriaId": "27E05347-1CFD-46FC-999A-90E6C40CEE26", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:r600:-:*:*:*:*:*:*:*", "matchCriteriaId": "5421B1D7-E630-4BDA-BA34-7DD8D0738DF4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:t300_firmware:10.5.1.0.199:*:*:*:*:*:*:*", "matchCriteriaId": "5D91278C-B07E-44FF-ABBA-10E8B5830FFA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:t300:-:*:*:*:*:*:*:*", "matchCriteriaId": "0511674E-59A6-427C-A265-B277D84DE301", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:t301n_firmware:10.5.1.0.199:*:*:*:*:*:*:*", "matchCriteriaId": "E0412E29-6DB5-4C01-B8C3-702EB7EBE8DE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:t301n:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBB7A43E-F5F1-465A-841F-05214EDA6833", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:t301s_firmware:10.5.1.0.199:*:*:*:*:*:*:*", "matchCriteriaId": "6DAA3771-2795-403D-8506-C155403C8B7C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:t301s:-:*:*:*:*:*:*:*", "matchCriteriaId": "68C4D9AC-5B1C-4066-8216-3F7127C3CC64", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:scg200_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "775F1067-344F-49AD-9901-97D2F1AC5F0F", "versionEndExcluding": "3.6.2.0.795", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:scg200:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6FB3968-8D8A-4D04-B3D1-18A28CA8C249", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:sz-100_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "46BCF71C-8A66-45C8-B1ED-8957B670CBF5", "versionEndExcluding": "3.6.2.0.795", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:sz-100:-:*:*:*:*:*:*:*", "matchCriteriaId": "3B9F3E41-79CA-45B7-B799-B0A64E60BA16", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:sz-300_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7CEA2295-79BE-4728-8BF2-DEAB2BCAA0E5", "versionEndExcluding": "3.6.2.0.795", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:sz-300:-:*:*:*:*:*:*:*", "matchCriteriaId": "4087D2FB-0853-40AE-A03F-803B5972A404", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:vsz_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B3E5690D-7955-4E12-AE51-C3CDAD596096", "versionEndExcluding": "3.6.2.0.795", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:vsz:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1E9A46B-D8E4-489A-8648-28EDDF000E28", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:zonedirector_1100_firmware:9.10.2.0.130:*:*:*:*:*:*:*", "matchCriteriaId": "76872953-AA21-41F1-832E-5CD04CA0FF9A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:zonedirector_1100:-:*:*:*:*:*:*:*", "matchCriteriaId": "CF376AF6-E73A-425B-8E31-36330D8FEB73", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:zonedirector_1200_firmware:10.2.1.0.218:*:*:*:*:*:*:*", "matchCriteriaId": "83AD20A3-C56E-4436-A9CC-29884EF9EB67", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:zonedirector_1200:-:*:*:*:*:*:*:*", "matchCriteriaId": "0FE0C2B2-D14B-4798-95C4-F911B3B1D88E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:zonedirector_3000_firmware:10.2.1.0.218:*:*:*:*:*:*:*", "matchCriteriaId": "86A26EBE-4077-4DE7-BC6C-D38F5A3D3E7B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:zonedirector_3000:-:*:*:*:*:*:*:*", "matchCriteriaId": "5A1F42A8-8785-48A5-B0B0-68504EFD38B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:zonedirector_5000_firmware:10.0.1.0.151:*:*:*:*:*:*:*", "matchCriteriaId": "04D53E59-6431-4ED3-BA0B-E54B2FBCDE0D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:zonedirector_5000:-:*:*:*:*:*:*:*", "matchCriteriaId": "1DA49DE5-DA7F-4531-9ACF-353561DA90E4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Ruckus R310 10.5.1.0.199, Ruckus R500 10.5.1.0.199, Ruckus R600 10.5.1.0.199, Ruckus T300 10.5.1.0.199, Ruckus T301n 10.5.1.0.199, Ruckus T301s 10.5.1.0.199, SmartCell Gateway 200 (SCG200) before 3.6.2.0.795, SmartZone 100 (SZ-100) before 3.6.2.0.795, SmartZone 300 (SZ300) before 3.6.2.0.795, Virtual SmartZone (vSZ) before 3.6.2.0.795, ZoneDirector 1100 9.10.2.0.130, ZoneDirector 1200 10.2.1.0.218, ZoneDirector 3000 10.2.1.0.218, ZoneDirector 5000 10.0.1.0.151, a vulnerability allows attackers to perform WEB GUI login authentication bypass." }, { "lang": "es", "value": "En Ruckus R310 10.5.1.0.199, Ruckus R500 10.5.1.0.199, Ruckus R600 10.5.1.0.199, Ruckus T300 10.5.1.0.199, Ruckus T301n 10.5.1.0.199, Ruckus T301s 10.5.1.0 .199, celda inteligente Gateway 200 (SCG200) anterior a 3.6.2.0.795, SmartZone 100 (SZ-100) anterior a 3.6.2.0.795, SmartZone 300 (SZ300) anterior a 3.6.2.0.795, Virtual SmartZone (vSZ) anterior a 3.6.2.0.795, ZoneDirector 1100 9.10.2.0.130, ZoneDirector 1200 10.2.1.0.218, ZoneDirector 3000 10.2.1.0.218, ZoneDirector 5000 10.0.1.0.151, una vulnerabilidad permite a los atacantes realizar una omisi\u00f3n de autenticaci\u00f3n de inicio de sesi\u00f3n en la GUI WEB." } ], "id": "CVE-2020-22657", "lastModified": "2025-04-03T18:15:39.810", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.2, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2023-01-20T19:15:12.787", "references": [ { "source": "cve@mitre.org", "url": "https://hdhrmi.blogspot.com/2020/03/multiple-vulnerabilities-in-ruckus.html?m=1" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://support.ruckuswireless.com/security_bulletins/302" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://support.ruckuswireless.com/security_bulletins/302" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2023-01-20 19:15
Modified
2025-04-03 18:15
Severity ?
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Summary
In Ruckus R310 10.5.1.0.199, Ruckus R500 10.5.1.0.199, Ruckus R600 10.5.1.0.199, Ruckus T300 10.5.1.0.199, Ruckus T301n 10.5.1.0.199, Ruckus T301s 10.5.1.0.199, SmartCell Gateway 200 (SCG200) before 3.6.2.0.795, SmartZone 100 (SZ-100) before 3.6.2.0.795, SmartZone 300 (SZ300) before 3.6.2.0.795, Virtual SmartZone (vSZ) before 3.6.2.0.795, ZoneDirector 1100 9.10.2.0.130, ZoneDirector 1200 10.2.1.0.218, ZoneDirector 3000 10.2.1.0.218, ZoneDirector 5000 10.0.1.0.151, a vulnerability allows attackers to exploit the official image signature to force injection unauthorized image signature.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ruckuswireless | r310_firmware | 10.5.1.0.199 | |
ruckuswireless | r310 | - | |
ruckuswireless | r500_firmware | 10.5.1.0.199 | |
ruckuswireless | r500 | - | |
ruckuswireless | r600_firmware | 10.5.1.0.199 | |
ruckuswireless | r600 | - | |
ruckuswireless | t300_firmware | 10.5.1.0.199 | |
ruckuswireless | t300 | - | |
ruckuswireless | t301n_firmware | 10.5.1.0.199 | |
ruckuswireless | t301n | - | |
ruckuswireless | t301s_firmware | 10.5.1.0.199 | |
ruckuswireless | t301s | - | |
ruckuswireless | scg200_firmware | * | |
ruckuswireless | scg200 | - | |
ruckuswireless | sz-100_firmware | * | |
ruckuswireless | sz-100 | - | |
ruckuswireless | sz-300_firmware | * | |
ruckuswireless | sz-300 | - | |
ruckuswireless | vsz_firmware | * | |
ruckuswireless | vsz | - | |
ruckuswireless | zonedirector_1100_firmware | 9.10.2.0.130 | |
ruckuswireless | zonedirector_1100 | - | |
ruckuswireless | zonedirector_1200_firmware | 10.2.1.0.218 | |
ruckuswireless | zonedirector_1200 | - | |
ruckuswireless | zonedirector_3000_firmware | 10.2.1.0.218 | |
ruckuswireless | zonedirector_3000 | - | |
ruckuswireless | zonedirector_5000_firmware | 10.0.1.0.151 | |
ruckuswireless | zonedirector_5000 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:r310_firmware:10.5.1.0.199:*:*:*:*:*:*:*", "matchCriteriaId": "5ED8801F-2B0B-480D-876D-9F662B995851", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:r310:-:*:*:*:*:*:*:*", "matchCriteriaId": "40D3129E-4C02-484F-96B6-59D76F787D21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:r500_firmware:10.5.1.0.199:*:*:*:*:*:*:*", "matchCriteriaId": "E54CB15F-CA79-403B-A1B1-B7832B65EEC3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:r500:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BBDBE9C-BE4B-4ED6-AF62-8FE484C519E2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:r600_firmware:10.5.1.0.199:*:*:*:*:*:*:*", "matchCriteriaId": "27E05347-1CFD-46FC-999A-90E6C40CEE26", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:r600:-:*:*:*:*:*:*:*", "matchCriteriaId": "5421B1D7-E630-4BDA-BA34-7DD8D0738DF4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:t300_firmware:10.5.1.0.199:*:*:*:*:*:*:*", "matchCriteriaId": "5D91278C-B07E-44FF-ABBA-10E8B5830FFA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:t300:-:*:*:*:*:*:*:*", "matchCriteriaId": "0511674E-59A6-427C-A265-B277D84DE301", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:t301n_firmware:10.5.1.0.199:*:*:*:*:*:*:*", "matchCriteriaId": "E0412E29-6DB5-4C01-B8C3-702EB7EBE8DE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:t301n:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBB7A43E-F5F1-465A-841F-05214EDA6833", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:t301s_firmware:10.5.1.0.199:*:*:*:*:*:*:*", "matchCriteriaId": "6DAA3771-2795-403D-8506-C155403C8B7C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:t301s:-:*:*:*:*:*:*:*", "matchCriteriaId": "68C4D9AC-5B1C-4066-8216-3F7127C3CC64", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:scg200_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "775F1067-344F-49AD-9901-97D2F1AC5F0F", "versionEndExcluding": "3.6.2.0.795", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:scg200:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6FB3968-8D8A-4D04-B3D1-18A28CA8C249", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:sz-100_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "46BCF71C-8A66-45C8-B1ED-8957B670CBF5", "versionEndExcluding": "3.6.2.0.795", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:sz-100:-:*:*:*:*:*:*:*", "matchCriteriaId": "3B9F3E41-79CA-45B7-B799-B0A64E60BA16", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:sz-300_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7CEA2295-79BE-4728-8BF2-DEAB2BCAA0E5", "versionEndExcluding": "3.6.2.0.795", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:sz-300:-:*:*:*:*:*:*:*", "matchCriteriaId": "4087D2FB-0853-40AE-A03F-803B5972A404", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:vsz_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B3E5690D-7955-4E12-AE51-C3CDAD596096", "versionEndExcluding": "3.6.2.0.795", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:vsz:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1E9A46B-D8E4-489A-8648-28EDDF000E28", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:zonedirector_1100_firmware:9.10.2.0.130:*:*:*:*:*:*:*", "matchCriteriaId": "76872953-AA21-41F1-832E-5CD04CA0FF9A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:zonedirector_1100:-:*:*:*:*:*:*:*", "matchCriteriaId": "CF376AF6-E73A-425B-8E31-36330D8FEB73", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:zonedirector_1200_firmware:10.2.1.0.218:*:*:*:*:*:*:*", "matchCriteriaId": "83AD20A3-C56E-4436-A9CC-29884EF9EB67", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:zonedirector_1200:-:*:*:*:*:*:*:*", "matchCriteriaId": "0FE0C2B2-D14B-4798-95C4-F911B3B1D88E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:zonedirector_3000_firmware:10.2.1.0.218:*:*:*:*:*:*:*", "matchCriteriaId": "86A26EBE-4077-4DE7-BC6C-D38F5A3D3E7B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:zonedirector_3000:-:*:*:*:*:*:*:*", "matchCriteriaId": "5A1F42A8-8785-48A5-B0B0-68504EFD38B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:zonedirector_5000_firmware:10.0.1.0.151:*:*:*:*:*:*:*", "matchCriteriaId": "04D53E59-6431-4ED3-BA0B-E54B2FBCDE0D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:zonedirector_5000:-:*:*:*:*:*:*:*", "matchCriteriaId": "1DA49DE5-DA7F-4531-9ACF-353561DA90E4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Ruckus R310 10.5.1.0.199, Ruckus R500 10.5.1.0.199, Ruckus R600 10.5.1.0.199, Ruckus T300 10.5.1.0.199, Ruckus T301n 10.5.1.0.199, Ruckus T301s 10.5.1.0.199, SmartCell Gateway 200 (SCG200) before 3.6.2.0.795, SmartZone 100 (SZ-100) before 3.6.2.0.795, SmartZone 300 (SZ300) before 3.6.2.0.795, Virtual SmartZone (vSZ) before 3.6.2.0.795, ZoneDirector 1100 9.10.2.0.130, ZoneDirector 1200 10.2.1.0.218, ZoneDirector 3000 10.2.1.0.218, ZoneDirector 5000 10.0.1.0.151, a vulnerability allows attackers to exploit the official image signature to force injection unauthorized image signature." }, { "lang": "es", "value": "En Ruckus R310 10.5.1.0.199, Ruckus R500 10.5.1.0.199, Ruckus R600 10.5.1.0.199, Ruckus T300 10.5.1.0.199, Ruckus T301n 10.5.1.0.199, Ruckus T301s 10.5.1.0 .199, SmartCell Gateway 200 (SCG200) anterior a 3.6.2.0.795, SmartZone 100 (SZ-100) anterior a 3.6.2.0.795, SmartZone 300 (SZ300) anterior a 3.6.2.0.795, Virtual SmartZone (vSZ) anterior a 3.6.2.0.795, ZoneDirector 1100 9.10.2.0.130, ZoneDirector 1200 10.2.1.0.218, ZoneDirector 3000 10.2.1.0.218, ZoneDirector 5000 10.0.1.0.151, una vulnerabilidad permite a los atacantes explotar la firma de la imagen oficial para forzar la inyecci\u00f3n de una firma de imagen no autorizada." } ], "id": "CVE-2020-22659", "lastModified": "2025-04-03T18:15:40.023", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2023-01-20T19:15:12.897", "references": [ { "source": "cve@mitre.org", "url": "https://hdhrmi.blogspot.com/2020/03/multiple-vulnerabilities-in-ruckus.html?m=1" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://support.ruckuswireless.com/security_bulletins/302" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://support.ruckuswireless.com/security_bulletins/302" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-347" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
CVE-2023-49225 (GCVE-0-2023-49225)
Vulnerability from cvelistv5
Published
2023-12-07 06:22
Modified
2025-05-28 13:58
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Cross-site scripting (XSS)
Summary
A cross-site-scripting vulnerability exists in Ruckus Access Point products (ZoneDirector, SmartZone, and AP Solo). If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who is logging in the product. As for the affected products/models/versions, see the information provided by the vendor listed under [References] section or the list under [Product Status] section.
References
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | CommScope, Inc. | ZoneDirector |
Version: 10.5.1 and earlier |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T21:53:45.350Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://support.ruckuswireless.com/security_bulletins/323" }, { "tags": [ "x_transferred" ], "url": "https://jvn.jp/en/jp/JVN45891816/" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-49225", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-05-28T13:53:26.065683Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-28T13:58:41.326Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "ZoneDirector", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "10.5.1 and earlier " } ] }, { "product": "SmartZone", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "6.1.1 and earlier " } ] }, { "product": "AP Solo R750", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "114.0.0.0.6565 and earlier " } ] }, { "product": "AP Solo R650", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "114.0.0.0.6565 and earlier " } ] }, { "product": "AP Solo R730", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "114.0.0.0.6565 and earlier " } ] }, { "product": "AP Solo T750", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "114.0.0.0.6565 and earlier " } ] }, { "product": "AP Solo R550", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "114.0.0.0.5585 and earlier " } ] }, { "product": "AP Solo R850", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "114.0.0.0.5585 and earlier " } ] }, { "product": "AP Solo T750SE", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "114.0.0.0.5585 and earlier " } ] }, { "product": "AP Solo R510", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "114.0.0.0.6565 and earlier " } ] }, { "product": "AP Solo T310D", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "114.0.0.0.6565 and earlier " } ] }, { "product": "AP Solo E510", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "114.0.0.0.6565 and earlier " } ] }, { "product": "AP Solo C110", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "114.0.0.0.6565 and earlier " } ] }, { "product": "AP Solo R320", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "114.0.0.0.6565 and earlier " } ] }, { "product": "AP Solo H510", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "114.0.0.0.6565 and earlier " } ] }, { "product": "AP Solo H320", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "114.0.0.0.6565 and earlier " } ] }, { "product": "AP Solo T310S", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "114.0.0.0.6565 and earlier " } ] }, { "product": "AP Solo T310N", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "114.0.0.0.6565 and earlier " } ] }, { "product": "AP Solo T310C", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "114.0.0.0.6565 and earlier " } ] }, { "product": "AP Solo T305", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "114.0.0.0.6565 and earlier " } ] }, { "product": "AP Solo M510", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "114.0.0.0.6565 and earlier " } ] }, { "product": "AP Solo R720", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "114.0.0.0.6565 and earlier " } ] }, { "product": "AP Solo R710", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "114.0.0.0.6565 and earlier " } ] }, { "product": "AP Solo T710", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "114.0.0.0.6565 and earlier " } ] }, { "product": "AP Solo T710s", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "114.0.0.0.6565 and earlier " } ] }, { "product": "AP Solo T610", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "114.0.0.0.6565 and earlier " } ] }, { "product": "AP Solo T610s", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "114.0.0.0.6565 and earlier " } ] }, { "product": "AP Solo R610", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "114.0.0.0.6565 and earlier " } ] }, { "product": "AP Solo R310", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "110.0.0.0.2014 and earlier " } ] }, { "product": "AP Solo R760", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "118.1.0.0.1274 and earlier " } ] }, { "product": "AP Solo R560", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "118.1.0.0.1908 and earlier " } ] }, { "product": "AP Solo H550", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "116.0.0.0.1506 and earlier " } ] }, { "product": "AP Solo H350", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "116.0.0.0.3128 and earlier " } ] }, { "product": "AP Solo T350c", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "116.0.0.0.1543 and earlier " } ] }, { "product": "AP Solo T350d", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "116.0.0.0.1543 and earlier " } ] }, { "product": "AP Solo T350se", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "116.0.0.0.3136 and earlier " } ] }, { "product": "AP Solo R350", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "116.0.0.0.1655 and earlier " } ] } ], "descriptions": [ { "lang": "en", "value": "A cross-site-scripting vulnerability exists in Ruckus Access Point products (ZoneDirector, SmartZone, and AP Solo). If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who is logging in the product. As for the affected products/models/versions, see the information provided by the vendor listed under [References] section or the list under [Product Status] section." } ], "problemTypes": [ { "descriptions": [ { "description": "Cross-site scripting (XSS)", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-07T06:22:32.328Z", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "https://support.ruckuswireless.com/security_bulletins/323" }, { "url": "https://jvn.jp/en/jp/JVN45891816/" } ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2023-49225", "datePublished": "2023-12-07T06:22:32.328Z", "dateReserved": "2023-11-24T00:19:52.591Z", "dateUpdated": "2025-05-28T13:58:41.326Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-22656 (GCVE-0-2020-22656)
Vulnerability from cvelistv5
Published
2023-01-20 00:00
Modified
2025-04-03 18:01
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
In Ruckus R310 10.5.1.0.199, Ruckus R500 10.5.1.0.199, Ruckus R600 10.5.1.0.199, Ruckus T300 10.5.1.0.199, Ruckus T301n 10.5.1.0.199, Ruckus T301s 10.5.1.0.199, SmartCell Gateway 200 (SCG200) before 3.6.2.0.795, SmartZone 100 (SZ-100) before 3.6.2.0.795, SmartZone 300 (SZ300) before 3.6.2.0.795, Virtual SmartZone (vSZ) before 3.6.2.0.795, ZoneDirector 1100 9.10.2.0.130, ZoneDirector 1200 10.2.1.0.218, ZoneDirector 3000 10.2.1.0.218, ZoneDirector 5000 10.0.1.0.151, a vulnerability allows attackers to make the Secure Boot in failed attempts state (rfwd).
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T14:51:11.124Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://support.ruckuswireless.com/security_bulletins/302" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2020-22656", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-03T18:00:42.932639Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1272", "description": "CWE-1272 Sensitive Information Uncleared Before Debug/Power State Transition", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-03T18:01:29.652Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In Ruckus R310 10.5.1.0.199, Ruckus R500 10.5.1.0.199, Ruckus R600 10.5.1.0.199, Ruckus T300 10.5.1.0.199, Ruckus T301n 10.5.1.0.199, Ruckus T301s 10.5.1.0.199, SmartCell Gateway 200 (SCG200) before 3.6.2.0.795, SmartZone 100 (SZ-100) before 3.6.2.0.795, SmartZone 300 (SZ300) before 3.6.2.0.795, Virtual SmartZone (vSZ) before 3.6.2.0.795, ZoneDirector 1100 9.10.2.0.130, ZoneDirector 1200 10.2.1.0.218, ZoneDirector 3000 10.2.1.0.218, ZoneDirector 5000 10.0.1.0.151, a vulnerability allows attackers to make the Secure Boot in failed attempts state (rfwd)." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-06T20:06:35.072Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://support.ruckuswireless.com/security_bulletins/302" }, { "url": "https://hdhrmi.blogspot.com/2020/03/multiple-vulnerabilities-in-ruckus.html?m=1" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-22656", "datePublished": "2023-01-20T00:00:00.000Z", "dateReserved": "2020-08-13T00:00:00.000Z", "dateUpdated": "2025-04-03T18:01:29.652Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-22659 (GCVE-0-2020-22659)
Vulnerability from cvelistv5
Published
2023-01-20 00:00
Modified
2025-04-03 17:57
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
In Ruckus R310 10.5.1.0.199, Ruckus R500 10.5.1.0.199, Ruckus R600 10.5.1.0.199, Ruckus T300 10.5.1.0.199, Ruckus T301n 10.5.1.0.199, Ruckus T301s 10.5.1.0.199, SmartCell Gateway 200 (SCG200) before 3.6.2.0.795, SmartZone 100 (SZ-100) before 3.6.2.0.795, SmartZone 300 (SZ300) before 3.6.2.0.795, Virtual SmartZone (vSZ) before 3.6.2.0.795, ZoneDirector 1100 9.10.2.0.130, ZoneDirector 1200 10.2.1.0.218, ZoneDirector 3000 10.2.1.0.218, ZoneDirector 5000 10.0.1.0.151, a vulnerability allows attackers to exploit the official image signature to force injection unauthorized image signature.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T14:51:11.182Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://support.ruckuswireless.com/security_bulletins/302" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2020-22659", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-03T17:56:23.793345Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-347", "description": "CWE-347 Improper Verification of Cryptographic Signature", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-03T17:57:18.623Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In Ruckus R310 10.5.1.0.199, Ruckus R500 10.5.1.0.199, Ruckus R600 10.5.1.0.199, Ruckus T300 10.5.1.0.199, Ruckus T301n 10.5.1.0.199, Ruckus T301s 10.5.1.0.199, SmartCell Gateway 200 (SCG200) before 3.6.2.0.795, SmartZone 100 (SZ-100) before 3.6.2.0.795, SmartZone 300 (SZ300) before 3.6.2.0.795, Virtual SmartZone (vSZ) before 3.6.2.0.795, ZoneDirector 1100 9.10.2.0.130, ZoneDirector 1200 10.2.1.0.218, ZoneDirector 3000 10.2.1.0.218, ZoneDirector 5000 10.0.1.0.151, a vulnerability allows attackers to exploit the official image signature to force injection unauthorized image signature." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-06T20:14:18.648Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://support.ruckuswireless.com/security_bulletins/302" }, { "url": "https://hdhrmi.blogspot.com/2020/03/multiple-vulnerabilities-in-ruckus.html?m=1" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-22659", "datePublished": "2023-01-20T00:00:00.000Z", "dateReserved": "2020-08-13T00:00:00.000Z", "dateUpdated": "2025-04-03T17:57:18.623Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-6229 (GCVE-0-2017-6229)
Vulnerability from cvelistv5
Published
2018-02-14 19:00
Modified
2024-09-16 23:55
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Authenticated command injection in CLI interface of ZD/Unleashed software.
Summary
Ruckus Networks Unleashed AP firmware releases before 200.6.10.1.x and Ruckus Networks Zone Director firmware releases 10.1.0.0.x, 9.10.2.0.x, 9.12.3.0.x, 9.13.3.0.x, 10.0.1.0.x or before contain authenticated Root Command Injection in the CLI that could allow authenticated valid users to execute privileged commands on the respective systems.
References
▼ | URL | Tags |
---|---|---|
https://ruckus-www.s3.amazonaws.com/pdf/security/faq-security-advisory-id-20180202-v1.0.txt | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Brocade Communications Systems, Inc. | Ruckus Networks Unleashed APs and Zone Director |
Version: Unleashed AP firmware releases before 200.6.10.1.x and ZD firmware releases 10.1.0.0.x, 9.10.2.0.x, 9.12.3.0.x,9.13.3.0.x, 10.0.1.0.x or before |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T15:25:48.601Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://ruckus-www.s3.amazonaws.com/pdf/security/faq-security-advisory-id-20180202-v1.0.txt" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Ruckus Networks Unleashed APs and Zone Director", "vendor": "Brocade Communications Systems, Inc.", "versions": [ { "status": "affected", "version": "Unleashed AP firmware releases before 200.6.10.1.x and ZD firmware releases 10.1.0.0.x, 9.10.2.0.x, 9.12.3.0.x,9.13.3.0.x, 10.0.1.0.x or before" } ] } ], "datePublic": "2018-02-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Ruckus Networks Unleashed AP firmware releases before 200.6.10.1.x and Ruckus Networks Zone Director firmware releases 10.1.0.0.x, 9.10.2.0.x, 9.12.3.0.x, 9.13.3.0.x, 10.0.1.0.x or before contain authenticated Root Command Injection in the CLI that could allow authenticated valid users to execute privileged commands on the respective systems." } ], "problemTypes": [ { "descriptions": [ { "description": "Authenticated command injection in CLI interface of ZD/Unleashed software.", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-02-14T18:57:02", "orgId": "87b297d7-335e-4844-9551-11b97995a791", "shortName": "brocade" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://ruckus-www.s3.amazonaws.com/pdf/security/faq-security-advisory-id-20180202-v1.0.txt" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "sirt@brocade.com", "DATE_PUBLIC": "2018-02-09T00:00:00", "ID": "CVE-2017-6229", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Ruckus Networks Unleashed APs and Zone Director", "version": { "version_data": [ { "version_value": "Unleashed AP firmware releases before 200.6.10.1.x and ZD firmware releases 10.1.0.0.x, 9.10.2.0.x, 9.12.3.0.x,9.13.3.0.x, 10.0.1.0.x or before" } ] } } ] }, "vendor_name": "Brocade Communications Systems, Inc." } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Ruckus Networks Unleashed AP firmware releases before 200.6.10.1.x and Ruckus Networks Zone Director firmware releases 10.1.0.0.x, 9.10.2.0.x, 9.12.3.0.x, 9.13.3.0.x, 10.0.1.0.x or before contain authenticated Root Command Injection in the CLI that could allow authenticated valid users to execute privileged commands on the respective systems." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Authenticated command injection in CLI interface of ZD/Unleashed software." } ] } ] }, "references": { "reference_data": [ { "name": "https://ruckus-www.s3.amazonaws.com/pdf/security/faq-security-advisory-id-20180202-v1.0.txt", "refsource": "CONFIRM", "url": "https://ruckus-www.s3.amazonaws.com/pdf/security/faq-security-advisory-id-20180202-v1.0.txt" } ] } } } }, "cveMetadata": { "assignerOrgId": "87b297d7-335e-4844-9551-11b97995a791", "assignerShortName": "brocade", "cveId": "CVE-2017-6229", "datePublished": "2018-02-14T19:00:00Z", "dateReserved": "2017-02-23T00:00:00", "dateUpdated": "2024-09-16T23:55:41.500Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-7234 (GCVE-0-2020-7234)
Vulnerability from cvelistv5
Published
2020-01-19 20:03
Modified
2024-08-04 09:25
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Ruckus ZoneFlex R310 104.0.0.0.1347 devices allow Stored XSS via the SSID field on the Configuration > Radio 2.4G > Wireless X screen (after a successful login to the super account).
References
▼ | URL | Tags |
---|---|---|
https://sku11army.blogspot.com/2020/01/ruckus-wireless-authenticated-stored.html | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T09:25:48.905Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://sku11army.blogspot.com/2020/01/ruckus-wireless-authenticated-stored.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Ruckus ZoneFlex R310 104.0.0.0.1347 devices allow Stored XSS via the SSID field on the Configuration \u003e Radio 2.4G \u003e Wireless X screen (after a successful login to the super account)." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-01-19T20:03:16", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://sku11army.blogspot.com/2020/01/ruckus-wireless-authenticated-stored.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-7234", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Ruckus ZoneFlex R310 104.0.0.0.1347 devices allow Stored XSS via the SSID field on the Configuration \u003e Radio 2.4G \u003e Wireless X screen (after a successful login to the super account)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://sku11army.blogspot.com/2020/01/ruckus-wireless-authenticated-stored.html", "refsource": "MISC", "url": "https://sku11army.blogspot.com/2020/01/ruckus-wireless-authenticated-stored.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-7234", "datePublished": "2020-01-19T20:03:16", "dateReserved": "2020-01-19T00:00:00", "dateUpdated": "2024-08-04T09:25:48.905Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-22654 (GCVE-0-2020-22654)
Vulnerability from cvelistv5
Published
2023-01-20 00:00
Modified
2025-04-03 17:43
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
In Ruckus R310 10.5.1.0.199, Ruckus R500 10.5.1.0.199, Ruckus R600 10.5.1.0.199, Ruckus T300 10.5.1.0.199, Ruckus T301n 10.5.1.0.199, Ruckus T301s 10.5.1.0.199, SmartCell Gateway 200 (SCG200) before 3.6.2.0.795, SmartZone 100 (SZ-100) before 3.6.2.0.795, SmartZone 300 (SZ300) before 3.6.2.0.795, Virtual SmartZone (vSZ) before 3.6.2.0.795, ZoneDirector 1100 9.10.2.0.130, ZoneDirector 1200 10.2.1.0.218, ZoneDirector 3000 10.2.1.0.218, ZoneDirector 5000 10.0.1.0.151, a vulnerability allows attackers to bypass firmware image bad md5 checksum failed error.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T14:51:10.815Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://support.ruckuswireless.com/security_bulletins/302" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2020-22654", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-04-03T17:43:12.496331Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-494", "description": "CWE-494 Download of Code Without Integrity Check", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-03T17:43:35.199Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In Ruckus R310 10.5.1.0.199, Ruckus R500 10.5.1.0.199, Ruckus R600 10.5.1.0.199, Ruckus T300 10.5.1.0.199, Ruckus T301n 10.5.1.0.199, Ruckus T301s 10.5.1.0.199, SmartCell Gateway 200 (SCG200) before 3.6.2.0.795, SmartZone 100 (SZ-100) before 3.6.2.0.795, SmartZone 300 (SZ300) before 3.6.2.0.795, Virtual SmartZone (vSZ) before 3.6.2.0.795, ZoneDirector 1100 9.10.2.0.130, ZoneDirector 1200 10.2.1.0.218, ZoneDirector 3000 10.2.1.0.218, ZoneDirector 5000 10.0.1.0.151, a vulnerability allows attackers to bypass firmware image bad md5 checksum failed error." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-06T19:59:58.159Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://support.ruckuswireless.com/security_bulletins/302" }, { "url": "https://hdhrmi.blogspot.com/2020/03/multiple-vulnerabilities-in-ruckus.html?m=1" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-22654", "datePublished": "2023-01-20T00:00:00.000Z", "dateReserved": "2020-08-13T00:00:00.000Z", "dateUpdated": "2025-04-03T17:43:35.199Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-22662 (GCVE-0-2020-22662)
Vulnerability from cvelistv5
Published
2023-01-20 00:00
Modified
2025-04-03 17:52
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
In Ruckus R310 10.5.1.0.199, Ruckus R500 10.5.1.0.199, Ruckus R600 10.5.1.0.199, Ruckus T300 10.5.1.0.199, Ruckus T301n 10.5.1.0.199, Ruckus T301s 10.5.1.0.199, SmartCell Gateway 200 (SCG200) before 3.6.2.0.795, SmartZone 100 (SZ-100) before 3.6.2.0.795, SmartZone 300 (SZ300) before 3.6.2.0.795, Virtual SmartZone (vSZ) before 3.6.2.0.795, ZoneDirector 1100 9.10.2.0.130, ZoneDirector 1200 10.2.1.0.218, ZoneDirector 3000 10.2.1.0.218, ZoneDirector 5000 10.0.1.0.151, a vulnerability allows attackers to change and set unauthorized "illegal region code" by remote code Execution command injection which leads to run illegal frequency with maxi output power. Vulnerability allows attacker to create an arbitrary amount of ssid wlans interface per radio which creates overhead over noise (the default max limit is 8 ssid only per radio in solo AP). Vulnerability allows attacker to unlock hidden regions by privilege command injection in WEB GUI.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T14:51:11.155Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://support.ruckuswireless.com/security_bulletins/302" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2020-22662", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-03T17:51:56.217635Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-77", "description": "CWE-77 Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-03T17:52:58.522Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In Ruckus R310 10.5.1.0.199, Ruckus R500 10.5.1.0.199, Ruckus R600 10.5.1.0.199, Ruckus T300 10.5.1.0.199, Ruckus T301n 10.5.1.0.199, Ruckus T301s 10.5.1.0.199, SmartCell Gateway 200 (SCG200) before 3.6.2.0.795, SmartZone 100 (SZ-100) before 3.6.2.0.795, SmartZone 300 (SZ300) before 3.6.2.0.795, Virtual SmartZone (vSZ) before 3.6.2.0.795, ZoneDirector 1100 9.10.2.0.130, ZoneDirector 1200 10.2.1.0.218, ZoneDirector 3000 10.2.1.0.218, ZoneDirector 5000 10.0.1.0.151, a vulnerability allows attackers to change and set unauthorized \"illegal region code\" by remote code Execution command injection which leads to run illegal frequency with maxi output power. Vulnerability allows attacker to create an arbitrary amount of ssid wlans interface per radio which creates overhead over noise (the default max limit is 8 ssid only per radio in solo AP). Vulnerability allows attacker to unlock hidden regions by privilege command injection in WEB GUI." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-06T20:21:46.168Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://support.ruckuswireless.com/security_bulletins/302" }, { "url": "https://hdhrmi.blogspot.com/2020/03/multiple-vulnerabilities-in-ruckus.html?m=1" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-22662", "datePublished": "2023-01-20T00:00:00.000Z", "dateReserved": "2020-08-13T00:00:00.000Z", "dateUpdated": "2025-04-03T17:52:58.522Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-22658 (GCVE-0-2020-22658)
Vulnerability from cvelistv5
Published
2023-01-20 00:00
Modified
2025-04-03 20:48
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
In Ruckus R310 10.5.1.0.199, Ruckus R500 10.5.1.0.199, Ruckus R600 10.5.1.0.199, Ruckus T300 10.5.1.0.199, Ruckus T301n 10.5.1.0.199, Ruckus T301s 10.5.1.0.199, SmartCell Gateway 200 (SCG200) before 3.6.2.0.795, SmartZone 100 (SZ-100) before 3.6.2.0.795, SmartZone 300 (SZ300) before 3.6.2.0.795, Virtual SmartZone (vSZ) before 3.6.2.0.795, ZoneDirector 1100 9.10.2.0.130, ZoneDirector 1200 10.2.1.0.218, ZoneDirector 3000 10.2.1.0.218, ZoneDirector 5000 10.0.1.0.151, a vulnerability allows attackers to switch completely to unauthorized image to be Boot as primary verified image.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T14:51:11.213Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://support.ruckuswireless.com/security_bulletins/302" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2020-22658", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-04-03T20:48:01.216036Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-494", "description": "CWE-494 Download of Code Without Integrity Check", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-03T20:48:13.970Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In Ruckus R310 10.5.1.0.199, Ruckus R500 10.5.1.0.199, Ruckus R600 10.5.1.0.199, Ruckus T300 10.5.1.0.199, Ruckus T301n 10.5.1.0.199, Ruckus T301s 10.5.1.0.199, SmartCell Gateway 200 (SCG200) before 3.6.2.0.795, SmartZone 100 (SZ-100) before 3.6.2.0.795, SmartZone 300 (SZ300) before 3.6.2.0.795, Virtual SmartZone (vSZ) before 3.6.2.0.795, ZoneDirector 1100 9.10.2.0.130, ZoneDirector 1200 10.2.1.0.218, ZoneDirector 3000 10.2.1.0.218, ZoneDirector 5000 10.0.1.0.151, a vulnerability allows attackers to switch completely to unauthorized image to be Boot as primary verified image." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-06T20:12:18.280Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://support.ruckuswireless.com/security_bulletins/302" }, { "url": "https://hdhrmi.blogspot.com/2020/03/multiple-vulnerabilities-in-ruckus.html?m=1" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-22658", "datePublished": "2023-01-20T00:00:00.000Z", "dateReserved": "2020-08-13T00:00:00.000Z", "dateUpdated": "2025-04-03T20:48:13.970Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-22657 (GCVE-0-2020-22657)
Vulnerability from cvelistv5
Published
2023-01-20 00:00
Modified
2025-04-03 17:59
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
In Ruckus R310 10.5.1.0.199, Ruckus R500 10.5.1.0.199, Ruckus R600 10.5.1.0.199, Ruckus T300 10.5.1.0.199, Ruckus T301n 10.5.1.0.199, Ruckus T301s 10.5.1.0.199, SmartCell Gateway 200 (SCG200) before 3.6.2.0.795, SmartZone 100 (SZ-100) before 3.6.2.0.795, SmartZone 300 (SZ300) before 3.6.2.0.795, Virtual SmartZone (vSZ) before 3.6.2.0.795, ZoneDirector 1100 9.10.2.0.130, ZoneDirector 1200 10.2.1.0.218, ZoneDirector 3000 10.2.1.0.218, ZoneDirector 5000 10.0.1.0.151, a vulnerability allows attackers to perform WEB GUI login authentication bypass.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T14:51:10.736Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://support.ruckuswireless.com/security_bulletins/302" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2020-22657", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-04-03T17:59:30.477642Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-287", "description": "CWE-287 Improper Authentication", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-03T17:59:56.951Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In Ruckus R310 10.5.1.0.199, Ruckus R500 10.5.1.0.199, Ruckus R600 10.5.1.0.199, Ruckus T300 10.5.1.0.199, Ruckus T301n 10.5.1.0.199, Ruckus T301s 10.5.1.0.199, SmartCell Gateway 200 (SCG200) before 3.6.2.0.795, SmartZone 100 (SZ-100) before 3.6.2.0.795, SmartZone 300 (SZ300) before 3.6.2.0.795, Virtual SmartZone (vSZ) before 3.6.2.0.795, ZoneDirector 1100 9.10.2.0.130, ZoneDirector 1200 10.2.1.0.218, ZoneDirector 3000 10.2.1.0.218, ZoneDirector 5000 10.0.1.0.151, a vulnerability allows attackers to perform WEB GUI login authentication bypass." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-06T20:03:48.379Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://support.ruckuswireless.com/security_bulletins/302" }, { "url": "https://hdhrmi.blogspot.com/2020/03/multiple-vulnerabilities-in-ruckus.html?m=1" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-22657", "datePublished": "2023-01-20T00:00:00.000Z", "dateReserved": "2020-08-13T00:00:00.000Z", "dateUpdated": "2025-04-03T17:59:56.951Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-22653 (GCVE-0-2020-22653)
Vulnerability from cvelistv5
Published
2023-01-20 00:00
Modified
2025-04-03 17:45
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
In Ruckus R310 10.5.1.0.199, Ruckus R500 10.5.1.0.199, Ruckus R600 10.5.1.0.199, Ruckus T300 10.5.1.0.199, Ruckus T301n 10.5.1.0.199, Ruckus T301s 10.5.1.0.199, SmartCell Gateway 200 (SCG200) before 3.6.2.0.795, SmartZone 100 (SZ-100) before 3.6.2.0.795, SmartZone 300 (SZ300) before 3.6.2.0.795, Virtual SmartZone (vSZ) before 3.6.2.0.795, ZoneDirector 1100 9.10.2.0.130, ZoneDirector 1200 10.2.1.0.218, ZoneDirector 3000 10.2.1.0.218, ZoneDirector 5000 10.0.1.0.151, a vulnerability allows attackers to exploit the official image signature to force injection unauthorized image signature.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T14:51:10.805Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://support.ruckuswireless.com/security_bulletins/302" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2020-22653", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-04-03T17:44:52.616313Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-347", "description": "CWE-347 Improper Verification of Cryptographic Signature", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-03T17:45:23.512Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In Ruckus R310 10.5.1.0.199, Ruckus R500 10.5.1.0.199, Ruckus R600 10.5.1.0.199, Ruckus T300 10.5.1.0.199, Ruckus T301n 10.5.1.0.199, Ruckus T301s 10.5.1.0.199, SmartCell Gateway 200 (SCG200) before 3.6.2.0.795, SmartZone 100 (SZ-100) before 3.6.2.0.795, SmartZone 300 (SZ300) before 3.6.2.0.795, Virtual SmartZone (vSZ) before 3.6.2.0.795, ZoneDirector 1100 9.10.2.0.130, ZoneDirector 1200 10.2.1.0.218, ZoneDirector 3000 10.2.1.0.218, ZoneDirector 5000 10.0.1.0.151, a vulnerability allows attackers to exploit the official image signature to force injection unauthorized image signature." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-06T19:32:06.793Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://support.ruckuswireless.com/security_bulletins/302" }, { "url": "https://hdhrmi.blogspot.com/2020/03/multiple-vulnerabilities-in-ruckus.html?m=1" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-22653", "datePublished": "2023-01-20T00:00:00.000Z", "dateReserved": "2020-08-13T00:00:00.000Z", "dateUpdated": "2025-04-03T17:45:23.512Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-22661 (GCVE-0-2020-22661)
Vulnerability from cvelistv5
Published
2023-01-20 00:00
Modified
2025-04-03 17:54
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
In Ruckus R310 10.5.1.0.199, Ruckus R500 10.5.1.0.199, Ruckus R600 10.5.1.0.199, Ruckus T300 10.5.1.0.199, Ruckus T301n 10.5.1.0.199, Ruckus T301s 10.5.1.0.199, SmartCell Gateway 200 (SCG200) before 3.6.2.0.795, SmartZone 100 (SZ-100) before 3.6.2.0.795, SmartZone 300 (SZ300) before 3.6.2.0.795, Virtual SmartZone (vSZ) before 3.6.2.0.795, ZoneDirector 1100 9.10.2.0.130, ZoneDirector 1200 10.2.1.0.218, ZoneDirector 3000 10.2.1.0.218, ZoneDirector 5000 10.0.1.0.151, a vulnerability allows attackers to erase the backup secondary official image and write secondary backup unauthorized image.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T14:51:11.121Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://support.ruckuswireless.com/security_bulletins/302" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2020-22661", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-03T17:53:33.052625Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-306", "description": "CWE-306 Missing Authentication for Critical Function", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-03T17:54:19.179Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In Ruckus R310 10.5.1.0.199, Ruckus R500 10.5.1.0.199, Ruckus R600 10.5.1.0.199, Ruckus T300 10.5.1.0.199, Ruckus T301n 10.5.1.0.199, Ruckus T301s 10.5.1.0.199, SmartCell Gateway 200 (SCG200) before 3.6.2.0.795, SmartZone 100 (SZ-100) before 3.6.2.0.795, SmartZone 300 (SZ300) before 3.6.2.0.795, Virtual SmartZone (vSZ) before 3.6.2.0.795, ZoneDirector 1100 9.10.2.0.130, ZoneDirector 1200 10.2.1.0.218, ZoneDirector 3000 10.2.1.0.218, ZoneDirector 5000 10.0.1.0.151, a vulnerability allows attackers to erase the backup secondary official image and write secondary backup unauthorized image." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-06T20:23:44.879Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://support.ruckuswireless.com/security_bulletins/302" }, { "url": "https://hdhrmi.blogspot.com/2020/03/multiple-vulnerabilities-in-ruckus.html?m=1" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-22661", "datePublished": "2023-01-20T00:00:00.000Z", "dateReserved": "2020-08-13T00:00:00.000Z", "dateUpdated": "2025-04-03T17:54:19.179Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-22660 (GCVE-0-2020-22660)
Vulnerability from cvelistv5
Published
2023-01-20 00:00
Modified
2025-04-03 17:55
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
In Ruckus R310 10.5.1.0.199, Ruckus R500 10.5.1.0.199, Ruckus R600 10.5.1.0.199, Ruckus T300 10.5.1.0.199, Ruckus T301n 10.5.1.0.199, Ruckus T301s 10.5.1.0.199, SmartCell Gateway 200 (SCG200) before 3.6.2.0.795, SmartZone 100 (SZ-100) before 3.6.2.0.795, SmartZone 300 (SZ300) before 3.6.2.0.795, Virtual SmartZone (vSZ) before 3.6.2.0.795, ZoneDirector 1100 9.10.2.0.130, ZoneDirector 1200 10.2.1.0.218, ZoneDirector 3000 10.2.1.0.218, ZoneDirector 5000 10.0.1.0.151, a vulnerability allows attackers to force bypass Secure Boot failed attempts and run temporarily the previous Backup image.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T14:51:11.164Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://support.ruckuswireless.com/security_bulletins/302" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2020-22660", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-03T17:55:00.404412Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-290", "description": "CWE-290 Authentication Bypass by Spoofing", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-03T17:55:51.093Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In Ruckus R310 10.5.1.0.199, Ruckus R500 10.5.1.0.199, Ruckus R600 10.5.1.0.199, Ruckus T300 10.5.1.0.199, Ruckus T301n 10.5.1.0.199, Ruckus T301s 10.5.1.0.199, SmartCell Gateway 200 (SCG200) before 3.6.2.0.795, SmartZone 100 (SZ-100) before 3.6.2.0.795, SmartZone 300 (SZ300) before 3.6.2.0.795, Virtual SmartZone (vSZ) before 3.6.2.0.795, ZoneDirector 1100 9.10.2.0.130, ZoneDirector 1200 10.2.1.0.218, ZoneDirector 3000 10.2.1.0.218, ZoneDirector 5000 10.0.1.0.151, a vulnerability allows attackers to force bypass Secure Boot failed attempts and run temporarily the previous Backup image." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-06T20:16:30.466Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://support.ruckuswireless.com/security_bulletins/302" }, { "url": "https://hdhrmi.blogspot.com/2020/03/multiple-vulnerabilities-in-ruckus.html?m=1" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-22660", "datePublished": "2023-01-20T00:00:00.000Z", "dateReserved": "2020-08-13T00:00:00.000Z", "dateUpdated": "2025-04-03T17:55:51.093Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-22655 (GCVE-0-2020-22655)
Vulnerability from cvelistv5
Published
2023-01-20 00:00
Modified
2025-04-03 18:03
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
In Ruckus R310 10.5.1.0.199, Ruckus R500 10.5.1.0.199, Ruckus R600 10.5.1.0.199, Ruckus T300 10.5.1.0.199, Ruckus T301n 10.5.1.0.199, Ruckus T301s 10.5.1.0.199, SmartCell Gateway 200 (SCG200) before 3.6.2.0.795, SmartZone 100 (SZ-100) before 3.6.2.0.795, SmartZone 300 (SZ300) before 3.6.2.0.795, Virtual SmartZone (vSZ) before 3.6.2.0.795, ZoneDirector 1100 9.10.2.0.130, ZoneDirector 1200 10.2.1.0.218, ZoneDirector 3000 10.2.1.0.218, ZoneDirector 5000 10.0.1.0.151, a vulnerability allows attackers to persistently to writing unauthorized image.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T14:51:11.050Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://support.ruckuswireless.com/security_bulletins/302" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2020-22655", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-03T18:02:58.690128Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284 Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-03T18:03:04.302Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In Ruckus R310 10.5.1.0.199, Ruckus R500 10.5.1.0.199, Ruckus R600 10.5.1.0.199, Ruckus T300 10.5.1.0.199, Ruckus T301n 10.5.1.0.199, Ruckus T301s 10.5.1.0.199, SmartCell Gateway 200 (SCG200) before 3.6.2.0.795, SmartZone 100 (SZ-100) before 3.6.2.0.795, SmartZone 300 (SZ300) before 3.6.2.0.795, Virtual SmartZone (vSZ) before 3.6.2.0.795, ZoneDirector 1100 9.10.2.0.130, ZoneDirector 1200 10.2.1.0.218, ZoneDirector 3000 10.2.1.0.218, ZoneDirector 5000 10.0.1.0.151, a vulnerability allows attackers to persistently to writing unauthorized image." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-06T20:02:06.130Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://support.ruckuswireless.com/security_bulletins/302" }, { "url": "https://hdhrmi.blogspot.com/2020/03/multiple-vulnerabilities-in-ruckus.html?m=1" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-22655", "datePublished": "2023-01-20T00:00:00.000Z", "dateReserved": "2020-08-13T00:00:00.000Z", "dateUpdated": "2025-04-03T18:03:04.302Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }