Vulnerabilites related to ruckuswireless - t350c_firmware
CVE-2023-49225 (GCVE-0-2023-49225)
Vulnerability from cvelistv5
Published
2023-12-07 06:22
Modified
2025-05-28 13:58
CWE
  • Cross-site scripting (XSS)
Summary
A cross-site-scripting vulnerability exists in Ruckus Access Point products (ZoneDirector, SmartZone, and AP Solo). If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who is logging in the product. As for the affected products/models/versions, see the information provided by the vendor listed under [References] section or the list under [Product Status] section.
Impacted products
Vendor Product Version
CommScope, Inc. ZoneDirector Version: 10.5.1 and earlier
Create a notification for this product.
   CommScope, Inc. SmartZone Version: 6.1.1 and earlier
Create a notification for this product.
   CommScope, Inc. AP Solo R750 Version: 114.0.0.0.6565 and earlier
Create a notification for this product.
   CommScope, Inc. AP Solo R650 Version: 114.0.0.0.6565 and earlier
Create a notification for this product.
   CommScope, Inc. AP Solo R730 Version: 114.0.0.0.6565 and earlier
Create a notification for this product.
   CommScope, Inc. AP Solo T750 Version: 114.0.0.0.6565 and earlier
Create a notification for this product.
   CommScope, Inc. AP Solo R550 Version: 114.0.0.0.5585 and earlier
Create a notification for this product.
   CommScope, Inc. AP Solo R850 Version: 114.0.0.0.5585 and earlier
Create a notification for this product.
   CommScope, Inc. AP Solo T750SE Version: 114.0.0.0.5585 and earlier
Create a notification for this product.
   CommScope, Inc. AP Solo R510 Version: 114.0.0.0.6565 and earlier
Create a notification for this product.
   CommScope, Inc. AP Solo T310D Version: 114.0.0.0.6565 and earlier
Create a notification for this product.
   CommScope, Inc. AP Solo E510 Version: 114.0.0.0.6565 and earlier
Create a notification for this product.
   CommScope, Inc. AP Solo C110 Version: 114.0.0.0.6565 and earlier
Create a notification for this product.
   CommScope, Inc. AP Solo R320 Version: 114.0.0.0.6565 and earlier
Create a notification for this product.
   CommScope, Inc. AP Solo H510 Version: 114.0.0.0.6565 and earlier
Create a notification for this product.
   CommScope, Inc. AP Solo H320 Version: 114.0.0.0.6565 and earlier
Create a notification for this product.
   CommScope, Inc. AP Solo T310S Version: 114.0.0.0.6565 and earlier
Create a notification for this product.
   CommScope, Inc. AP Solo T310N Version: 114.0.0.0.6565 and earlier
Create a notification for this product.
   CommScope, Inc. AP Solo T310C Version: 114.0.0.0.6565 and earlier
Create a notification for this product.
   CommScope, Inc. AP Solo T305 Version: 114.0.0.0.6565 and earlier
Create a notification for this product.
   CommScope, Inc. AP Solo M510 Version: 114.0.0.0.6565 and earlier
Create a notification for this product.
   CommScope, Inc. AP Solo R720 Version: 114.0.0.0.6565 and earlier
Create a notification for this product.
   CommScope, Inc. AP Solo R710 Version: 114.0.0.0.6565 and earlier
Create a notification for this product.
   CommScope, Inc. AP Solo T710 Version: 114.0.0.0.6565 and earlier
Create a notification for this product.
   CommScope, Inc. AP Solo T710s Version: 114.0.0.0.6565 and earlier
Create a notification for this product.
   CommScope, Inc. AP Solo T610 Version: 114.0.0.0.6565 and earlier
Create a notification for this product.
   CommScope, Inc. AP Solo T610s Version: 114.0.0.0.6565 and earlier
Create a notification for this product.
   CommScope, Inc. AP Solo R610 Version: 114.0.0.0.6565 and earlier
Create a notification for this product.
   CommScope, Inc. AP Solo R310 Version: 110.0.0.0.2014 and earlier
Create a notification for this product.
   CommScope, Inc. AP Solo R760 Version: 118.1.0.0.1274 and earlier
Create a notification for this product.
   CommScope, Inc. AP Solo R560 Version: 118.1.0.0.1908 and earlier
Create a notification for this product.
   CommScope, Inc. AP Solo H550 Version: 116.0.0.0.1506 and earlier
Create a notification for this product.
   CommScope, Inc. AP Solo H350 Version: 116.0.0.0.3128 and earlier
Create a notification for this product.
   CommScope, Inc. AP Solo T350c Version: 116.0.0.0.1543 and earlier
Create a notification for this product.
   CommScope, Inc. AP Solo T350d Version: 116.0.0.0.1543 and earlier
Create a notification for this product.
   CommScope, Inc. AP Solo T350se Version: 116.0.0.0.3136 and earlier
Create a notification for this product.
   CommScope, Inc. AP Solo R350 Version: 116.0.0.0.1655 and earlier
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T21:53:45.350Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://support.ruckuswireless.com/security_bulletins/323"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://jvn.jp/en/jp/JVN45891816/"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "NONE",
              "baseScore": 6.1,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "LOW",
              "integrityImpact": "LOW",
              "privilegesRequired": "NONE",
              "scope": "CHANGED",
              "userInteraction": "REQUIRED",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2023-49225",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-05-28T13:53:26.065683Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-79",
                "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-05-28T13:58:41.326Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "ZoneDirector",
          "vendor": "CommScope, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "10.5.1 and earlier "
            }
          ]
        },
        {
          "product": "SmartZone",
          "vendor": "CommScope, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "6.1.1 and earlier "
            }
          ]
        },
        {
          "product": "AP Solo R750",
          "vendor": "CommScope, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "114.0.0.0.6565 and earlier "
            }
          ]
        },
        {
          "product": "AP Solo R650",
          "vendor": "CommScope, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "114.0.0.0.6565 and earlier "
            }
          ]
        },
        {
          "product": "AP Solo R730",
          "vendor": "CommScope, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "114.0.0.0.6565 and earlier "
            }
          ]
        },
        {
          "product": "AP Solo T750",
          "vendor": "CommScope, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "114.0.0.0.6565 and earlier "
            }
          ]
        },
        {
          "product": "AP Solo R550",
          "vendor": "CommScope, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "114.0.0.0.5585 and earlier "
            }
          ]
        },
        {
          "product": "AP Solo R850",
          "vendor": "CommScope, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "114.0.0.0.5585 and earlier "
            }
          ]
        },
        {
          "product": "AP Solo T750SE",
          "vendor": "CommScope, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "114.0.0.0.5585 and earlier "
            }
          ]
        },
        {
          "product": "AP Solo R510",
          "vendor": "CommScope, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "114.0.0.0.6565 and earlier "
            }
          ]
        },
        {
          "product": "AP Solo T310D",
          "vendor": "CommScope, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "114.0.0.0.6565 and earlier "
            }
          ]
        },
        {
          "product": "AP Solo E510",
          "vendor": "CommScope, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "114.0.0.0.6565 and earlier "
            }
          ]
        },
        {
          "product": "AP Solo C110",
          "vendor": "CommScope, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "114.0.0.0.6565 and earlier "
            }
          ]
        },
        {
          "product": "AP Solo R320",
          "vendor": "CommScope, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "114.0.0.0.6565 and earlier "
            }
          ]
        },
        {
          "product": "AP Solo H510",
          "vendor": "CommScope, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "114.0.0.0.6565 and earlier "
            }
          ]
        },
        {
          "product": "AP Solo H320",
          "vendor": "CommScope, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "114.0.0.0.6565 and earlier "
            }
          ]
        },
        {
          "product": "AP Solo T310S",
          "vendor": "CommScope, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "114.0.0.0.6565 and earlier "
            }
          ]
        },
        {
          "product": "AP Solo T310N",
          "vendor": "CommScope, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "114.0.0.0.6565 and earlier "
            }
          ]
        },
        {
          "product": "AP Solo T310C",
          "vendor": "CommScope, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "114.0.0.0.6565 and earlier "
            }
          ]
        },
        {
          "product": "AP Solo T305",
          "vendor": "CommScope, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "114.0.0.0.6565 and earlier "
            }
          ]
        },
        {
          "product": "AP Solo M510",
          "vendor": "CommScope, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "114.0.0.0.6565 and earlier "
            }
          ]
        },
        {
          "product": "AP Solo R720",
          "vendor": "CommScope, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "114.0.0.0.6565 and earlier "
            }
          ]
        },
        {
          "product": "AP Solo R710",
          "vendor": "CommScope, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "114.0.0.0.6565 and earlier "
            }
          ]
        },
        {
          "product": "AP Solo T710",
          "vendor": "CommScope, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "114.0.0.0.6565 and earlier "
            }
          ]
        },
        {
          "product": "AP Solo T710s",
          "vendor": "CommScope, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "114.0.0.0.6565 and earlier "
            }
          ]
        },
        {
          "product": "AP Solo T610",
          "vendor": "CommScope, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "114.0.0.0.6565 and earlier "
            }
          ]
        },
        {
          "product": "AP Solo T610s",
          "vendor": "CommScope, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "114.0.0.0.6565 and earlier "
            }
          ]
        },
        {
          "product": "AP Solo R610",
          "vendor": "CommScope, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "114.0.0.0.6565 and earlier "
            }
          ]
        },
        {
          "product": "AP Solo R310",
          "vendor": "CommScope, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "110.0.0.0.2014 and earlier "
            }
          ]
        },
        {
          "product": "AP Solo R760",
          "vendor": "CommScope, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "118.1.0.0.1274 and earlier "
            }
          ]
        },
        {
          "product": "AP Solo R560",
          "vendor": "CommScope, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "118.1.0.0.1908 and earlier "
            }
          ]
        },
        {
          "product": "AP Solo H550",
          "vendor": "CommScope, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "116.0.0.0.1506 and earlier "
            }
          ]
        },
        {
          "product": "AP Solo H350",
          "vendor": "CommScope, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "116.0.0.0.3128 and earlier "
            }
          ]
        },
        {
          "product": "AP Solo T350c",
          "vendor": "CommScope, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "116.0.0.0.1543 and earlier "
            }
          ]
        },
        {
          "product": "AP Solo T350d",
          "vendor": "CommScope, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "116.0.0.0.1543 and earlier "
            }
          ]
        },
        {
          "product": "AP Solo T350se",
          "vendor": "CommScope, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "116.0.0.0.3136 and earlier "
            }
          ]
        },
        {
          "product": "AP Solo R350",
          "vendor": "CommScope, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "116.0.0.0.1655 and earlier "
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A cross-site-scripting vulnerability exists in Ruckus Access Point products (ZoneDirector, SmartZone, and AP Solo). If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who is logging in the product. As for the affected products/models/versions, see the information provided by the vendor listed under [References] section or the list under [Product Status] section."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Cross-site scripting (XSS)",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-12-07T06:22:32.328Z",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "url": "https://support.ruckuswireless.com/security_bulletins/323"
        },
        {
          "url": "https://jvn.jp/en/jp/JVN45891816/"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2023-49225",
    "datePublished": "2023-12-07T06:22:32.328Z",
    "dateReserved": "2023-11-24T00:19:52.591Z",
    "dateUpdated": "2025-05-28T13:58:41.326Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2023-12-07 07:15
Modified
2025-08-22 21:09
Summary
A cross-site-scripting vulnerability exists in Ruckus Access Point products (ZoneDirector, SmartZone, and AP Solo). If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who is logging in the product. As for the affected products/models/versions, see the information provided by the vendor listed under [References] section or the list under [Product Status] section.
Impacted products
Vendor Product Version
ruckuswireless r750_firmware *
ruckuswireless r750 -
ruckuswireless r650_firmware *
ruckuswireless r650 -
ruckuswireless r730_firmware *
ruckuswireless r730 -
ruckuswireless t750_firmware *
ruckuswireless t750 -
ruckuswireless r510_firmware *
ruckuswireless r510 -
ruckuswireless e510_firmware *
ruckuswireless e510 -
ruckuswireless c110_firmware *
ruckuswireless c110 -
ruckuswireless r320_firmware *
ruckuswireless r320 -
ruckuswireless h510_firmware *
ruckuswireless h510 -
ruckuswireless h320_firmware *
ruckuswireless h320 -
ruckuswireless t305_firmware *
ruckuswireless t305 -
ruckuswireless m510_firmware *
ruckuswireless m510 -
ruckuswireless r720_firmware *
ruckuswireless r720 -
ruckuswireless r710_firmware *
ruckuswireless r710 -
ruckuswireless t710_firmware *
ruckuswireless t710 -
ruckuswireless t610_firmware *
ruckuswireless t610 -
ruckuswireless r610_firmware *
ruckuswireless r610 -
ruckuswireless t310d_firmware *
ruckuswireless t310d -
ruckuswireless t310s_firmware *
ruckuswireless t310s -
ruckuswireless t310n_firmware *
ruckuswireless t310n -
ruckuswireless t310c_firmware *
ruckuswireless t310c -
ruckuswireless t710s_firmware *
ruckuswireless t710s -
ruckuswireless t610s_firmware *
ruckuswireless t610s -
ruckuswireless r550_firmware *
ruckuswireless r550 -
ruckuswireless r850_firmware *
ruckuswireless r850 -
ruckuswireless t750se_firmware *
ruckuswireless t750se -
ruckuswireless r310_firmware *
ruckuswireless r310 *
ruckuswireless r760_firmware *
ruckuswireless r760 *
ruckuswireless r760_firmware *
ruckuswireless r760 *
ruckuswireless r560_firmware *
ruckuswireless r560 *
ruckuswireless h550_firmware *
ruckuswireless h550 *
ruckuswireless h350_firmware *
ruckuswireless h350 *
ruckuswireless t350c_firmware *
ruckuswireless t350c *
ruckuswireless t350d_firmware *
ruckuswireless t350d *
ruckuswireless t350se_firmware *
ruckuswireless t350se *
ruckuswireless r350_firmware *
ruckuswireless r350 *
ruckuswireless smartzone_firmware *
commscope ruckus_smartzone -
ruckuswireless zonedirector_firmware *
ruckuswireless zonedirector -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruckuswireless:r750_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "19637FB4-A1EC-4DDB-9FD2-B176427B9933",
              "versionEndIncluding": "114.0.0.0.6565",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruckuswireless:r750:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA49CB45-1196-4AD7-8AB6-C5593BBF015F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruckuswireless:r650_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F805AE7-830E-4D88-AA80-40FEC783AC84",
              "versionEndIncluding": "114.0.0.0.6565",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruckuswireless:r650:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "951BDA12-0294-472A-9292-F60AC6D4292B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruckuswireless:r730_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F98CC2D-247B-493F-A1DD-8133622C2AE7",
              "versionEndIncluding": "114.0.0.0.6565",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruckuswireless:r730:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB28A5E0-6F42-4133-B1D3-1D0116079094",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruckuswireless:t750_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DFCDC4FB-7448-4E19-AF4D-897180F3775B",
              "versionEndIncluding": "114.0.0.0.6565",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruckuswireless:t750:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C15AA25-82B2-4C02-8361-E8F6179B525A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruckuswireless:r510_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D6269F0-AFA6-48A9-92D2-3A3250B1E6C0",
              "versionEndIncluding": "114.0.0.0.6565",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruckuswireless:r510:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80B2E8CC-EACE-4A80-9EB1-DADAB8034415",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruckuswireless:e510_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D2FB77C-1E97-44C5-A961-7F91B1A8AB34",
              "versionEndIncluding": "114.0.0.0.6565",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruckuswireless:e510:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FBF5C92C-C889-4732-BB00-E6D55613E410",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruckuswireless:c110_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6531A85F-9AA8-4A26-9A81-09003B8AAF2E",
              "versionEndIncluding": "114.0.0.0.6565",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruckuswireless:c110:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A77671DB-6197-4C8D-B667-A0081350E5AF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruckuswireless:r320_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C00DA68-6EA2-4D88-B60C-6980D4953912",
              "versionEndIncluding": "114.0.0.0.6565",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruckuswireless:r320:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "93CE3224-85D2-4039-8F24-BB503DFD42C2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruckuswireless:h510_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "843E61F5-DE53-47B3-BF24-B817BE9F334E",
              "versionEndIncluding": "114.0.0.0.6565",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruckuswireless:h510:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB1FAB48-786A-4FB3-AB6D-3118E94E68C7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruckuswireless:h320_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F625B309-F3BC-4899-B6B4-C460B7502730",
              "versionEndIncluding": "114.0.0.0.6565",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruckuswireless:h320:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "282C3A1D-711C-4415-B9BE-A9B518204AEB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruckuswireless:t305_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2ED5CB06-9A07-4EF6-B730-7D24B8E131F7",
              "versionEndIncluding": "114.0.0.0.6565",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruckuswireless:t305:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0500E6E8-D56C-41EC-B9C5-72C5DD955639",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruckuswireless:m510_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3EB3F18F-04F1-4D37-A74C-B12ED64ECDEE",
              "versionEndIncluding": "114.0.0.0.6565",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruckuswireless:m510:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4AE7200-4090-4B81-A22F-B8553A014D21",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruckuswireless:r720_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "73590841-C0E4-423B-89F3-C5E3E5DC3A84",
              "versionEndIncluding": "114.0.0.0.6565",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruckuswireless:r720:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDFDAF0A-9F5D-4E34-805E-6F27103AAA32",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruckuswireless:r710_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD213C0E-8D62-43C1-AAAD-72AB2455F4C8",
              "versionEndIncluding": "114.0.0.0.6565",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruckuswireless:r710:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E95884E9-C6AF-4106-A178-9274AD27EF65",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruckuswireless:t710_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1AC75B29-992F-4917-B0A9-6B4C16905E3A",
              "versionEndIncluding": "114.0.0.0.6565",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruckuswireless:t710:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A40B9489-D999-4355-953E-36A7F8DEF299",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruckuswireless:t610_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0273FF13-6329-4A68-B2B1-674D0FDCEACC",
              "versionEndIncluding": "114.0.0.0.6565",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruckuswireless:t610:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "210D55AB-9305-4D0B-B9F0-47889D37373B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruckuswireless:r610_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA61CD3-AFD8-4C9B-B707-850A352EFF63",
              "versionEndIncluding": "114.0.0.0.6565",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruckuswireless:r610:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4244947C-538E-4B83-B4F4-3DD4F3C22E83",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruckuswireless:t310d_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D3D9629-CDD0-497E-A798-BD68696D7B0A",
              "versionEndIncluding": "114.0.0.0.6565",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruckuswireless:t310d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2D3E8C6-4676-4B74-A252-132A26670C64",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruckuswireless:t310s_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "47656F30-691A-4072-B5DF-0B4026133B24",
              "versionEndIncluding": "114.0.0.0.6565",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruckuswireless:t310s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "72378D4B-ADB5-4DE5-BB92-1778BDFD61FC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruckuswireless:t310n_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8508F154-5538-401A-8A1E-192C38A482B4",
              "versionEndIncluding": "114.0.0.0.6565",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruckuswireless:t310n:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2ED4C9B4-7F70-4059-8592-FD3F034160C3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruckuswireless:t310c_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D50969FD-837B-49B3-820E-E02CA9CD75E3",
              "versionEndIncluding": "114.0.0.0.6565",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruckuswireless:t310c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFB69C4E-2B4F-4F61-8A65-9BA0354F33E3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruckuswireless:t710s_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "11907B93-2CC9-43E7-98E9-B13370225009",
              "versionEndIncluding": "114.0.0.0.6565",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruckuswireless:t710s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CFF0772-D853-4781-B326-E3BDEAC78EE0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruckuswireless:t610s_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6B8C9F8-76A1-4B8C-8FB9-770CB0E7DC94",
              "versionEndIncluding": "114.0.0.0.6565",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruckuswireless:t610s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "752CBB38-F5C6-4666-B062-B5E3B15CA1A0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruckuswireless:r550_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "260442D7-362E-4141-BE55-066154A5B587",
              "versionEndIncluding": "114.0.0.0.5585",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruckuswireless:r550:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "215024F9-C68E-4919-9FD5-215CF900A830",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruckuswireless:r850_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "392561BB-1413-44A3-B4D1-CC4A57DC67F1",
              "versionEndIncluding": "114.0.0.0.5585",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruckuswireless:r850:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A244DE5-A9B3-45BE-8AD1-154546F4F1F4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruckuswireless:t750se_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F079E97-F62E-4919-A21B-1443146FEB14",
              "versionEndIncluding": "114.0.0.0.5585",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruckuswireless:t750se:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E1DE3AD-CA13-44CE-ACF1-3DE2D6C691BC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruckuswireless:r310_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F6AF187-4EC5-4F8A-9FB3-E1FD4F71FA4F",
              "versionEndIncluding": "110.0.0.0.2014",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruckuswireless:r310:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "93655935-481F-477B-A0C3-EFFFB822C9D5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruckuswireless:r760_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "22D73A1E-302B-4494-B0CF-48D298A25916",
              "versionEndIncluding": "118.1.0.0.1274",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruckuswireless:r760:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "700D0FAA-0964-486A-932B-08CF1A328468",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruckuswireless:r760_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "22D73A1E-302B-4494-B0CF-48D298A25916",
              "versionEndIncluding": "118.1.0.0.1274",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruckuswireless:r760:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "700D0FAA-0964-486A-932B-08CF1A328468",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruckuswireless:r560_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BEFF83F-4F8E-4BFE-B964-2F019A846EF0",
              "versionEndIncluding": "118.1.0.0.1908",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruckuswireless:r560:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "75E00EC7-030F-4E90-8747-4AA87C2DA73D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruckuswireless:h550_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DFDDACE4-B572-4E7F-8D7C-333B3108D0F8",
              "versionEndIncluding": "116.0.0.0.1506",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruckuswireless:h550:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "843E2FCE-C3EC-406A-8ECB-BA5F51C2DCFF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruckuswireless:h350_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1056C4F-1A29-474A-AD6F-6911F68ED36E",
              "versionEndIncluding": "116.0.0.0.3128",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruckuswireless:h350:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "389825B3-BD3F-48F9-A6EB-238D1485E24D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruckuswireless:t350c_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "561DDAE6-C5A0-4DA8-AC07-0EF7D06A8848",
              "versionEndIncluding": "116.0.0.0.1543",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruckuswireless:t350c:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "663BF055-A677-418A-8009-599D7BE04221",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruckuswireless:t350d_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C77FF583-1BAF-4042-A5F0-07DF1FC4C5E4",
              "versionEndIncluding": "116.0.0.0.1543",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruckuswireless:t350d:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4323CCB1-EE5E-498F-86F3-00CE6C75F10D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruckuswireless:t350se_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BCC95847-0984-466D-9227-5A44971260F2",
              "versionEndIncluding": "116.0.0.0.3136",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruckuswireless:t350se:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "60A48D4A-75D9-486B-896D-7BF11AD3ED6B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruckuswireless:r350_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "004DED59-2353-40D5-997A-E021728E4F23",
              "versionEndIncluding": "116.0.0.0.1655",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruckuswireless:r350:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "34B3B5B6-3365-47B2-847E-004489533CDA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruckuswireless:smartzone_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E0D700D-F65B-49CC-BA09-41B22A6884C1",
              "versionEndIncluding": "6.1.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:commscope:ruckus_smartzone:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "92A4B5B7-E8A5-4FE1-8947-7BA90A37516A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ruckuswireless:zonedirector_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1DA133A-1251-4946-BC27-FECABFEA056A",
              "versionEndIncluding": "10.5.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:ruckuswireless:zonedirector:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC847897-E9C7-4247-BC22-E999847E1110",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A cross-site-scripting vulnerability exists in Ruckus Access Point products (ZoneDirector, SmartZone, and AP Solo). If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who is logging in the product. As for the affected products/models/versions, see the information provided by the vendor listed under [References] section or the list under [Product Status] section."
    },
    {
      "lang": "es",
      "value": "Existe una vulnerabilidad de Cross-Site-Scripting en los productos Ruckus Access Point (ZoneDirector, SmartZone y AP Solo). Si se explota esta vulnerabilidad, se puede ejecutar un script arbitrario en el navegador web del usuario que inicia sesi\u00f3n en el producto. En cuanto a los productos/modelos/versiones afectados, consulte la informaci\u00f3n proporcionada por el proveedor que figura en la secci\u00f3n [Referencias] o la lista en la secci\u00f3n [Estado del producto]."
    }
  ],
  "id": "CVE-2023-49225",
  "lastModified": "2025-08-22T21:09:15.577",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.1,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.1,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 2.7,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2023-12-07T07:15:12.880",
  "references": [
    {
      "source": "vultures@jpcert.or.jp",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://jvn.jp/en/jp/JVN45891816/"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://support.ruckuswireless.com/security_bulletins/323"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://jvn.jp/en/jp/JVN45891816/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://support.ruckuswireless.com/security_bulletins/323"
    }
  ],
  "sourceIdentifier": "vultures@jpcert.or.jp",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}