Vulnerabilites related to ruckuswireless - t300e
var-201802-0642
Vulnerability from variot

Ruckus Networks Unleashed AP firmware releases before 200.6.10.1.x and Ruckus Networks Zone Director firmware releases 10.1.0.0.x, 9.10.2.0.x, 9.12.3.0.x, 9.13.3.0.x, 10.0.1.0.x or before contain authenticated Root Command Injection in the CLI that could allow authenticated valid users to execute privileged commands on the respective systems. Both Ruckus Networks Unleashed AP and Ruckus Networks Zone Director are wireless access points from Ruckus Wireless. A remote attacker could exploit this vulnerability to execute privileged commands

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201802-0642",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "zonedirector 1200",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "ruckuswireless",
        "version": "10.1.0.0.1515"
      },
      {
        "model": "zonedirector 3000",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "ruckuswireless",
        "version": "10.1.0.0.1515"
      },
      {
        "model": "zonedirector 3000",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "ruckuswireless",
        "version": "9.12.3.0.28"
      },
      {
        "model": "t300e",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "ruckuswireless",
        "version": "200.6.10.1.0"
      },
      {
        "model": "zonedirector 1200",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "ruckuswireless",
        "version": "9.13.3.0.22"
      },
      {
        "model": "t301",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "ruckuswireless",
        "version": "200.6.10.1.0"
      },
      {
        "model": "r710",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "ruckuswireless",
        "version": "200.6.10.1.0"
      },
      {
        "model": "r500",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "ruckuswireless",
        "version": "200.6.10.1.0"
      },
      {
        "model": "t710",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "ruckuswireless",
        "version": "200.6.10.1.0"
      },
      {
        "model": "r310",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "ruckuswireless",
        "version": "200.6.10.1.0"
      },
      {
        "model": "h510",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "ruckuswireless",
        "version": "200.6.10.1.0"
      },
      {
        "model": "r600",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "ruckuswireless",
        "version": "200.6.10.1.0"
      },
      {
        "model": "zonedirector 1200",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "ruckuswireless",
        "version": "9.13.3.0.145"
      },
      {
        "model": "zonedirector 3000",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "ruckuswireless",
        "version": "9.10.2.0.53"
      },
      {
        "model": "zonedirector 1200",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "ruckuswireless",
        "version": "9.12.3.0.83"
      },
      {
        "model": "zonedirector 3000",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "ruckuswireless",
        "version": "10.0.1.0.44"
      },
      {
        "model": "t300",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "ruckuswireless",
        "version": "200.6.10.1.0"
      },
      {
        "model": "zonedirector 1200",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "ruckuswireless",
        "version": "10.0.1.0.17"
      },
      {
        "model": "zonedirector 1200",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "ruckuswireless",
        "version": "9.10.2.0.11"
      },
      {
        "model": "t610",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "ruckuswireless",
        "version": "200.6.10.1.0"
      },
      {
        "model": "zonedirector 3000",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "ruckuswireless",
        "version": "9.13.3.0.22"
      },
      {
        "model": "r720",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "ruckuswireless",
        "version": "200.6.10.1.0"
      },
      {
        "model": "r510",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "ruckuswireless",
        "version": "200.6.10.1.0"
      },
      {
        "model": "zonedirector 3000",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "ruckuswireless",
        "version": "10.0.1.0.17"
      },
      {
        "model": "zonedirector 3000",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "ruckuswireless",
        "version": "9.10.2.0.11"
      },
      {
        "model": "zonedirector 1200",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "ruckuswireless",
        "version": "9.12.3.0.28"
      },
      {
        "model": "h320",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "ruckuswireless",
        "version": "200.6.10.1.0"
      },
      {
        "model": "zonedirector 1200",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "ruckuswireless",
        "version": "10.0.1.0.44"
      },
      {
        "model": "zonedirector 1200",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "ruckuswireless",
        "version": "9.10.2.0.53"
      },
      {
        "model": "zonedirector 3000",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "ruckuswireless",
        "version": "9.13.3.0.145"
      },
      {
        "model": "zonedirector 3000",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "ruckuswireless",
        "version": "9.12.3.0.83"
      },
      {
        "model": "h320",
        "scope": null,
        "trust": 0.8,
        "vendor": "ruckus",
        "version": null
      },
      {
        "model": "h510",
        "scope": null,
        "trust": 0.8,
        "vendor": "ruckus",
        "version": null
      },
      {
        "model": "r310",
        "scope": null,
        "trust": 0.8,
        "vendor": "ruckus",
        "version": null
      },
      {
        "model": "r500",
        "scope": null,
        "trust": 0.8,
        "vendor": "ruckus",
        "version": null
      },
      {
        "model": "r510",
        "scope": null,
        "trust": 0.8,
        "vendor": "ruckus",
        "version": null
      },
      {
        "model": "r600",
        "scope": null,
        "trust": 0.8,
        "vendor": "ruckus",
        "version": null
      },
      {
        "model": "r710",
        "scope": null,
        "trust": 0.8,
        "vendor": "ruckus",
        "version": null
      },
      {
        "model": "r720",
        "scope": null,
        "trust": 0.8,
        "vendor": "ruckus",
        "version": null
      },
      {
        "model": "t300",
        "scope": null,
        "trust": 0.8,
        "vendor": "ruckus",
        "version": null
      },
      {
        "model": "t300e",
        "scope": null,
        "trust": 0.8,
        "vendor": "ruckus",
        "version": null
      },
      {
        "model": "t301",
        "scope": null,
        "trust": 0.8,
        "vendor": "ruckus",
        "version": null
      },
      {
        "model": "t610",
        "scope": null,
        "trust": 0.8,
        "vendor": "ruckus",
        "version": null
      },
      {
        "model": "t710",
        "scope": null,
        "trust": 0.8,
        "vendor": "ruckus",
        "version": null
      },
      {
        "model": "zonedirector 1200",
        "scope": null,
        "trust": 0.8,
        "vendor": "ruckus",
        "version": null
      },
      {
        "model": "zonedirector 3000",
        "scope": null,
        "trust": 0.8,
        "vendor": "ruckus",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-012629"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201802-916"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-6229"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/o:ruckus_wireless:h320_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:ruckus_wireless:h510_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:ruckus_wireless:r310_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:ruckus_wireless:r500_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:ruckus_wireless:r510_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:ruckus_wireless:r600_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:ruckus_wireless:r710_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:ruckus_wireless:r720_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:ruckus_wireless:t300_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:ruckus_wireless:t300e_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:ruckus_wireless:t301_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:ruckus_wireless:t610_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:ruckus_wireless:t710_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:ruckus_wireless:zonedirector_1200_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:ruckus_wireless:zonedirector_3000_firmware",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-012629"
      }
    ]
  },
  "cve": "CVE-2017-6229",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 9.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 8.0,
            "id": "CVE-2017-6229",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 1.8,
            "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 9.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 8.0,
            "id": "VHN-114432",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:S/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 2.8,
            "id": "CVE-2017-6229",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "trust": 1.8,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2017-6229",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2017-6229",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201802-916",
            "trust": 0.6,
            "value": "CRITICAL"
          },
          {
            "author": "VULHUB",
            "id": "VHN-114432",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-114432"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-012629"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201802-916"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-6229"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Ruckus Networks Unleashed AP firmware releases before 200.6.10.1.x and Ruckus Networks Zone Director firmware releases 10.1.0.0.x, 9.10.2.0.x, 9.12.3.0.x, 9.13.3.0.x, 10.0.1.0.x or before contain authenticated Root Command Injection in the CLI that could allow authenticated valid users to execute privileged commands on the respective systems. Both Ruckus Networks Unleashed AP and Ruckus Networks Zone Director are wireless access points from Ruckus Wireless. A remote attacker could exploit this vulnerability to execute privileged commands",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2017-6229"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-012629"
      },
      {
        "db": "VULHUB",
        "id": "VHN-114432"
      }
    ],
    "trust": 1.71
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2017-6229",
        "trust": 2.5
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-012629",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201802-916",
        "trust": 0.7
      },
      {
        "db": "VULHUB",
        "id": "VHN-114432",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-114432"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-012629"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201802-916"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-6229"
      }
    ]
  },
  "id": "VAR-201802-0642",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-114432"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2024-11-23T23:08:46.893000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Authenticated Root Command Injection Vulnerabilities in CLI of ZD/Unleashed APs and Web-GUI of Solo/SZ Managed APs (CVE-2017-6229, CVE2017-6230)",
        "trust": 0.8,
        "url": "https://ruckus-www.s3.amazonaws.com/pdf/security/faq-security-advisory-id-20180202-v1.0.txt"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-012629"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-78",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-114432"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-012629"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-6229"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.7,
        "url": "https://ruckus-www.s3.amazonaws.com/pdf/security/faq-security-advisory-id-20180202-v1.0.txt"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-6229"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-6229"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-114432"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-012629"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201802-916"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-6229"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-114432"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-012629"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201802-916"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-6229"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2018-02-14T00:00:00",
        "db": "VULHUB",
        "id": "VHN-114432"
      },
      {
        "date": "2018-03-28T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2017-012629"
      },
      {
        "date": "2018-02-14T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201802-916"
      },
      {
        "date": "2018-02-14T19:29:00.213000",
        "db": "NVD",
        "id": "CVE-2017-6229"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2018-03-12T00:00:00",
        "db": "VULHUB",
        "id": "VHN-114432"
      },
      {
        "date": "2018-03-28T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2017-012629"
      },
      {
        "date": "2018-08-21T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201802-916"
      },
      {
        "date": "2024-11-21T03:29:18.477000",
        "db": "NVD",
        "id": "CVE-2017-6229"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201802-916"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Ruckus Networks Unleashed AP and  Zone Director In firmware  OS Command injection vulnerability",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-012629"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "operating system commend injection",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201802-916"
      }
    ],
    "trust": 0.6
  }
}

Vulnerability from fkie_nvd
Published
2018-02-14 19:29
Modified
2024-11-21 03:29
Summary
Ruckus Networks Unleashed AP firmware releases before 200.6.10.1.x and Ruckus Networks Zone Director firmware releases 10.1.0.0.x, 9.10.2.0.x, 9.12.3.0.x, 9.13.3.0.x, 10.0.1.0.x or before contain authenticated Root Command Injection in the CLI that could allow authenticated valid users to execute privileged commands on the respective systems.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruckuswireless:r500_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7842F7BA-DB75-44BA-A505-03AC07443F55",
              "versionEndExcluding": "200.6.10.1.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruckuswireless:r500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BBDBE9C-BE4B-4ED6-AF62-8FE484C519E2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruckuswireless:r600_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "01AEB940-2D3C-4F8A-B2D2-075665F893EC",
              "versionEndExcluding": "200.6.10.1.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruckuswireless:r600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5421B1D7-E630-4BDA-BA34-7DD8D0738DF4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruckuswireless:r310_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "08795F10-C276-4A7D-83FD-C39A8844D854",
              "versionEndExcluding": "200.6.10.1.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruckuswireless:r310:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "40D3129E-4C02-484F-96B6-59D76F787D21",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruckuswireless:h320_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B282766-1ACE-4249-99CB-CF8DD099EBDC",
              "versionEndExcluding": "200.6.10.1.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruckuswireless:h320:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "282C3A1D-711C-4415-B9BE-A9B518204AEB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruckuswireless:h510_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "01348379-0624-46A2-B0EF-8877A6CBB8B6",
              "versionEndExcluding": "200.6.10.1.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruckuswireless:h510:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB1FAB48-786A-4FB3-AB6D-3118E94E68C7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruckuswireless:r710_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "61041E50-BDB8-431E-959F-BA6BF734F889",
              "versionEndExcluding": "200.6.10.1.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruckuswireless:r710:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E95884E9-C6AF-4106-A178-9274AD27EF65",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruckuswireless:r720_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F40E9FA2-CAD7-43E4-AACC-6E61B5D3B41C",
              "versionEndExcluding": "200.6.10.1.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruckuswireless:r720:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDFDAF0A-9F5D-4E34-805E-6F27103AAA32",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruckuswireless:t300_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "ACA58F89-2F73-42A6-AF00-BD17275650EA",
              "versionEndExcluding": "200.6.10.1.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruckuswireless:t300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0511674E-59A6-427C-A265-B277D84DE301",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruckuswireless:t301_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5B07FA9-7E5A-4429-A4F6-B2AD1AB89388",
              "versionEndExcluding": "200.6.10.1.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruckuswireless:t301:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FFEA172-9781-4FA8-96F2-DE09FB6340FE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruckuswireless:t300e_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FAD7213-2C06-4B24-8E36-9D5EE2B32720",
              "versionEndExcluding": "200.6.10.1.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruckuswireless:t300e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "787156EB-F6AA-445F-8B56-4C3696E08697",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruckuswireless:t610_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0395ED7F-AE77-4FF3-A139-718956FA13A7",
              "versionEndExcluding": "200.6.10.1.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruckuswireless:t610:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "210D55AB-9305-4D0B-B9F0-47889D37373B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruckuswireless:t710_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A02D3DD9-5369-45E4-84BE-678EC3DDDAC4",
              "versionEndExcluding": "200.6.10.1.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruckuswireless:t710:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "862672CC-0480-405C-9791-8993D19931A2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruckuswireless:r510_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6248C61C-ED6C-42AC-8B0D-DF197BF1107D",
              "versionEndExcluding": "200.6.10.1.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruckuswireless:r510:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80B2E8CC-EACE-4A80-9EB1-DADAB8034415",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruckuswireless:zonedirector_1200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA60F3C8-CF88-4336-A214-98292E45B39D",
              "versionEndIncluding": "9.10.2.0.53",
              "versionStartIncluding": "9.10.2.0.11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:ruckuswireless:zonedirector_1200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "87A7791C-AD3E-433E-9383-69BCC6F1A91F",
              "versionEndIncluding": "9.12.3.0.83",
              "versionStartIncluding": "9.12.3.0.28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:ruckuswireless:zonedirector_1200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "882D995A-9677-46BD-BF59-91DDAA4C73F6",
              "versionEndIncluding": "9.13.3.0.145",
              "versionStartIncluding": "9.13.3.0.22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:ruckuswireless:zonedirector_1200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB97CF78-F5A4-4BEE-B447-4E27CE05022B",
              "versionEndIncluding": "10.0.1.0.44",
              "versionStartIncluding": "10.0.1.0.17",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:ruckuswireless:zonedirector_1200_firmware:10.1.0.0.1515:*:*:*:*:*:*:*",
              "matchCriteriaId": "E832AD5B-50F7-4BB1-9116-33B67286D197",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruckuswireless:zonedirector_1200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0FE0C2B2-D14B-4798-95C4-F911B3B1D88E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruckuswireless:zonedirector_3000_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3DBB4B6-0ED3-425A-AB4A-B8B76521312F",
              "versionEndIncluding": "9.10.2.0.53",
              "versionStartIncluding": "9.10.2.0.11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:ruckuswireless:zonedirector_3000_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "77C9E693-D648-4636-97E0-62B819DDB9CB",
              "versionEndIncluding": "9.12.3.0.83",
              "versionStartIncluding": "9.12.3.0.28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:ruckuswireless:zonedirector_3000_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC11B771-8CB6-4009-861F-0AC6CA0519C1",
              "versionEndIncluding": "9.13.3.0.145",
              "versionStartIncluding": "9.13.3.0.22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:ruckuswireless:zonedirector_3000_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "26F9F52E-11E2-4995-AA03-F0AC4F33D0C9",
              "versionEndIncluding": "10.0.1.0.44",
              "versionStartIncluding": "10.0.1.0.17",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:ruckuswireless:zonedirector_3000_firmware:10.1.0.0.1515:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8636729-51EA-4292-8477-C78C11C5A8AC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruckuswireless:zonedirector_3000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A1F42A8-8785-48A5-B0B0-68504EFD38B9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Ruckus Networks Unleashed AP firmware releases before 200.6.10.1.x and Ruckus Networks Zone Director firmware releases 10.1.0.0.x, 9.10.2.0.x, 9.12.3.0.x, 9.13.3.0.x, 10.0.1.0.x or before contain authenticated Root Command Injection in the CLI that could allow authenticated valid users to execute privileged commands on the respective systems."
    },
    {
      "lang": "es",
      "value": "Ruckus Networks Unleashed AP, en versiones de firmware anteriores a 200.6.10.1.x y Ruckus Networks Zone Director, en versiones de firmware 10.1.0.0.x, 9.10.2.0.x, 9.12.3.0.x, 9.13.3.0.x y 10.0.1.0.x o anteriores, contienen inyecci\u00f3n de comandos root autenticados en la interfaz de l\u00ednea de comandos que podr\u00edan permitir que usuarios autenticados v\u00e1lidos ejecuten comandos privilegiados en los respectivos sistemas."
    }
  ],
  "id": "CVE-2017-6229",
  "lastModified": "2024-11-21T03:29:18.477",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 9.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-02-14T19:29:00.213",
  "references": [
    {
      "source": "sirt@brocade.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://ruckus-www.s3.amazonaws.com/pdf/security/faq-security-advisory-id-20180202-v1.0.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://ruckus-www.s3.amazonaws.com/pdf/security/faq-security-advisory-id-20180202-v1.0.txt"
    }
  ],
  "sourceIdentifier": "sirt@brocade.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-78"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2017-6229 (GCVE-0-2017-6229)
Vulnerability from cvelistv5
Published
2018-02-14 19:00
Modified
2024-09-16 23:55
Severity ?
CWE
  • Authenticated command injection in CLI interface of ZD/Unleashed software.
Summary
Ruckus Networks Unleashed AP firmware releases before 200.6.10.1.x and Ruckus Networks Zone Director firmware releases 10.1.0.0.x, 9.10.2.0.x, 9.12.3.0.x, 9.13.3.0.x, 10.0.1.0.x or before contain authenticated Root Command Injection in the CLI that could allow authenticated valid users to execute privileged commands on the respective systems.
Impacted products
Vendor Product Version
Brocade Communications Systems, Inc. Ruckus Networks Unleashed APs and Zone Director Version: Unleashed AP firmware releases before 200.6.10.1.x and ZD firmware releases 10.1.0.0.x, 9.10.2.0.x, 9.12.3.0.x,9.13.3.0.x, 10.0.1.0.x or before
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T15:25:48.601Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://ruckus-www.s3.amazonaws.com/pdf/security/faq-security-advisory-id-20180202-v1.0.txt"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Ruckus Networks Unleashed APs and Zone Director",
          "vendor": "Brocade Communications Systems, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Unleashed AP firmware releases before 200.6.10.1.x and ZD firmware releases 10.1.0.0.x, 9.10.2.0.x, 9.12.3.0.x,9.13.3.0.x, 10.0.1.0.x or before"
            }
          ]
        }
      ],
      "datePublic": "2018-02-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Ruckus Networks Unleashed AP firmware releases before 200.6.10.1.x and Ruckus Networks Zone Director firmware releases 10.1.0.0.x, 9.10.2.0.x, 9.12.3.0.x, 9.13.3.0.x, 10.0.1.0.x or before contain authenticated Root Command Injection in the CLI that could allow authenticated valid users to execute privileged commands on the respective systems."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Authenticated command injection in CLI interface of ZD/Unleashed software.",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-02-14T18:57:02",
        "orgId": "87b297d7-335e-4844-9551-11b97995a791",
        "shortName": "brocade"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://ruckus-www.s3.amazonaws.com/pdf/security/faq-security-advisory-id-20180202-v1.0.txt"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "sirt@brocade.com",
          "DATE_PUBLIC": "2018-02-09T00:00:00",
          "ID": "CVE-2017-6229",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Ruckus Networks Unleashed APs and Zone Director",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Unleashed AP firmware releases before 200.6.10.1.x and ZD firmware releases 10.1.0.0.x, 9.10.2.0.x, 9.12.3.0.x,9.13.3.0.x, 10.0.1.0.x or before"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Brocade Communications Systems, Inc."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Ruckus Networks Unleashed AP firmware releases before 200.6.10.1.x and Ruckus Networks Zone Director firmware releases 10.1.0.0.x, 9.10.2.0.x, 9.12.3.0.x, 9.13.3.0.x, 10.0.1.0.x or before contain authenticated Root Command Injection in the CLI that could allow authenticated valid users to execute privileged commands on the respective systems."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Authenticated command injection in CLI interface of ZD/Unleashed software."
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://ruckus-www.s3.amazonaws.com/pdf/security/faq-security-advisory-id-20180202-v1.0.txt",
              "refsource": "CONFIRM",
              "url": "https://ruckus-www.s3.amazonaws.com/pdf/security/faq-security-advisory-id-20180202-v1.0.txt"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "87b297d7-335e-4844-9551-11b97995a791",
    "assignerShortName": "brocade",
    "cveId": "CVE-2017-6229",
    "datePublished": "2018-02-14T19:00:00Z",
    "dateReserved": "2017-02-23T00:00:00",
    "dateUpdated": "2024-09-16T23:55:41.500Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}