Vulnerabilites related to ruckuswireless - zonedirector_firmware
CVE-2023-49225 (GCVE-0-2023-49225)
Vulnerability from cvelistv5
Published
2023-12-07 06:22
Modified
2025-05-28 13:58
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Cross-site scripting (XSS)
Summary
A cross-site-scripting vulnerability exists in Ruckus Access Point products (ZoneDirector, SmartZone, and AP Solo). If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who is logging in the product. As for the affected products/models/versions, see the information provided by the vendor listed under [References] section or the list under [Product Status] section.
References
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | CommScope, Inc. | ZoneDirector |
Version: 10.5.1 and earlier |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T21:53:45.350Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://support.ruckuswireless.com/security_bulletins/323" }, { "tags": [ "x_transferred" ], "url": "https://jvn.jp/en/jp/JVN45891816/" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-49225", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-05-28T13:53:26.065683Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-28T13:58:41.326Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "ZoneDirector", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "10.5.1 and earlier " } ] }, { "product": "SmartZone", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "6.1.1 and earlier " } ] }, { "product": "AP Solo R750", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "114.0.0.0.6565 and earlier " } ] }, { "product": "AP Solo R650", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "114.0.0.0.6565 and earlier " } ] }, { "product": "AP Solo R730", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "114.0.0.0.6565 and earlier " } ] }, { "product": "AP Solo T750", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "114.0.0.0.6565 and earlier " } ] }, { "product": "AP Solo R550", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "114.0.0.0.5585 and earlier " } ] }, { "product": "AP Solo R850", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "114.0.0.0.5585 and earlier " } ] }, { "product": "AP Solo T750SE", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "114.0.0.0.5585 and earlier " } ] }, { "product": "AP Solo R510", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "114.0.0.0.6565 and earlier " } ] }, { "product": "AP Solo T310D", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "114.0.0.0.6565 and earlier " } ] }, { "product": "AP Solo E510", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "114.0.0.0.6565 and earlier " } ] }, { "product": "AP Solo C110", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "114.0.0.0.6565 and earlier " } ] }, { "product": "AP Solo R320", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "114.0.0.0.6565 and earlier " } ] }, { "product": "AP Solo H510", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "114.0.0.0.6565 and earlier " } ] }, { "product": "AP Solo H320", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "114.0.0.0.6565 and earlier " } ] }, { "product": "AP Solo T310S", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "114.0.0.0.6565 and earlier " } ] }, { "product": "AP Solo T310N", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "114.0.0.0.6565 and earlier " } ] }, { "product": "AP Solo T310C", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "114.0.0.0.6565 and earlier " } ] }, { "product": "AP Solo T305", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "114.0.0.0.6565 and earlier " } ] }, { "product": "AP Solo M510", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "114.0.0.0.6565 and earlier " } ] }, { "product": "AP Solo R720", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "114.0.0.0.6565 and earlier " } ] }, { "product": "AP Solo R710", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "114.0.0.0.6565 and earlier " } ] }, { "product": "AP Solo T710", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "114.0.0.0.6565 and earlier " } ] }, { "product": "AP Solo T710s", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "114.0.0.0.6565 and earlier " } ] }, { "product": "AP Solo T610", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "114.0.0.0.6565 and earlier " } ] }, { "product": "AP Solo T610s", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "114.0.0.0.6565 and earlier " } ] }, { "product": "AP Solo R610", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "114.0.0.0.6565 and earlier " } ] }, { "product": "AP Solo R310", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "110.0.0.0.2014 and earlier " } ] }, { "product": "AP Solo R760", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "118.1.0.0.1274 and earlier " } ] }, { "product": "AP Solo R560", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "118.1.0.0.1908 and earlier " } ] }, { "product": "AP Solo H550", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "116.0.0.0.1506 and earlier " } ] }, { "product": "AP Solo H350", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "116.0.0.0.3128 and earlier " } ] }, { "product": "AP Solo T350c", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "116.0.0.0.1543 and earlier " } ] }, { "product": "AP Solo T350d", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "116.0.0.0.1543 and earlier " } ] }, { "product": "AP Solo T350se", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "116.0.0.0.3136 and earlier " } ] }, { "product": "AP Solo R350", "vendor": "CommScope, Inc.", "versions": [ { "status": "affected", "version": "116.0.0.0.1655 and earlier " } ] } ], "descriptions": [ { "lang": "en", "value": "A cross-site-scripting vulnerability exists in Ruckus Access Point products (ZoneDirector, SmartZone, and AP Solo). If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who is logging in the product. As for the affected products/models/versions, see the information provided by the vendor listed under [References] section or the list under [Product Status] section." } ], "problemTypes": [ { "descriptions": [ { "description": "Cross-site scripting (XSS)", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-07T06:22:32.328Z", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "https://support.ruckuswireless.com/security_bulletins/323" }, { "url": "https://jvn.jp/en/jp/JVN45891816/" } ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2023-49225", "datePublished": "2023-12-07T06:22:32.328Z", "dateReserved": "2023-11-24T00:19:52.591Z", "dateUpdated": "2025-05-28T13:58:41.326Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-21161 (GCVE-0-2020-21161)
Vulnerability from cvelistv5
Published
2022-06-27 14:56
Modified
2024-08-04 14:22
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Cross Site Scripting (XSS) vulnerability in Ruckus Wireless ZoneDirector 9.8.3.0.
References
▼ | URL | Tags |
---|---|---|
http://ruckus.com | x_refsource_MISC | |
http://zonedirector.com | x_refsource_MISC | |
https://dollahibrahim.blogspot.com/2019/11/cross-site-scripting-on-ruckus.html | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T14:22:25.581Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://ruckus.com" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://zonedirector.com" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://dollahibrahim.blogspot.com/2019/11/cross-site-scripting-on-ruckus.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Cross Site Scripting (XSS) vulnerability in Ruckus Wireless ZoneDirector 9.8.3.0." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-27T14:56:39", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://ruckus.com" }, { "tags": [ "x_refsource_MISC" ], "url": "http://zonedirector.com" }, { "tags": [ "x_refsource_MISC" ], "url": "https://dollahibrahim.blogspot.com/2019/11/cross-site-scripting-on-ruckus.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-21161", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross Site Scripting (XSS) vulnerability in Ruckus Wireless ZoneDirector 9.8.3.0." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://ruckus.com", "refsource": "MISC", "url": "http://ruckus.com" }, { "name": "http://zonedirector.com", "refsource": "MISC", "url": "http://zonedirector.com" }, { "name": "https://dollahibrahim.blogspot.com/2019/11/cross-site-scripting-on-ruckus.html", "refsource": "MISC", "url": "https://dollahibrahim.blogspot.com/2019/11/cross-site-scripting-on-ruckus.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-21161", "datePublished": "2022-06-27T14:56:39", "dateReserved": "2020-08-13T00:00:00", "dateUpdated": "2024-08-04T14:22:25.581Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-6224 (GCVE-0-2017-6224)
Vulnerability from cvelistv5
Published
2017-10-13 17:00
Modified
2024-09-16 18:34
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Authenticated Root Command Injection.
Summary
Ruckus Wireless Zone Director Controller firmware releases ZD9.x, ZD10.0.0.x, ZD10.0.1.x (less than 10.0.1.0.17 MR1 release) and Ruckus Wireless Unleashed AP Firmware releases 200.0.x, 200.1.x, 200.2.x, 200.3.x, 200.4.x. contain OS Command Injection vulnerabilities that could allow local authenticated users to execute arbitrary privileged commands on the underlying operating system by appending those commands in the Common Name field in the Certificate Generation Request.
References
▼ | URL | Tags |
---|---|---|
https://ruckus-www.s3.amazonaws.com/pdf/security/faq-security-advisory-id-092917.txt | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Brocade Communications Systems, Inc. | Zone Director Controller and Unleashed AP Firmware |
Version: ZD9.x Version: ZD10.0.0.x Version: ZD10.0.1.x Version: 200.x Version: 200.2.x Version: 200.3.x Version: 200.4.x |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T15:25:49.092Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://ruckus-www.s3.amazonaws.com/pdf/security/faq-security-advisory-id-092917.txt" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Zone Director Controller and Unleashed AP Firmware", "vendor": "Brocade Communications Systems, Inc.", "versions": [ { "status": "affected", "version": "ZD9.x" }, { "status": "affected", "version": "ZD10.0.0.x" }, { "status": "affected", "version": "ZD10.0.1.x" }, { "status": "affected", "version": "200.x" }, { "status": "affected", "version": "200.2.x" }, { "status": "affected", "version": "200.3.x" }, { "status": "affected", "version": "200.4.x" } ] } ], "datePublic": "2017-09-27T00:00:00", "descriptions": [ { "lang": "en", "value": "Ruckus Wireless Zone Director Controller firmware releases ZD9.x, ZD10.0.0.x, ZD10.0.1.x (less than 10.0.1.0.17 MR1 release) and Ruckus Wireless Unleashed AP Firmware releases 200.0.x, 200.1.x, 200.2.x, 200.3.x, 200.4.x. contain OS Command Injection vulnerabilities that could allow local authenticated users to execute arbitrary privileged commands on the underlying operating system by appending those commands in the Common Name field in the Certificate Generation Request." } ], "problemTypes": [ { "descriptions": [ { "description": "Authenticated Root Command Injection.", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-13T16:57:01", "orgId": "87b297d7-335e-4844-9551-11b97995a791", "shortName": "brocade" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://ruckus-www.s3.amazonaws.com/pdf/security/faq-security-advisory-id-092917.txt" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "sirt@brocade.com", "DATE_PUBLIC": "2017-09-27T00:00:00", "ID": "CVE-2017-6224", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Zone Director Controller and Unleashed AP Firmware", "version": { "version_data": [ { "version_value": "ZD9.x" }, { "version_value": "ZD10.0.0.x" }, { "version_value": "ZD10.0.1.x" }, { "version_value": "200.x" }, { "version_value": "200.2.x" }, { "version_value": "200.3.x" }, { "version_value": "200.4.x" } ] } } ] }, "vendor_name": "Brocade Communications Systems, Inc." } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Ruckus Wireless Zone Director Controller firmware releases ZD9.x, ZD10.0.0.x, ZD10.0.1.x (less than 10.0.1.0.17 MR1 release) and Ruckus Wireless Unleashed AP Firmware releases 200.0.x, 200.1.x, 200.2.x, 200.3.x, 200.4.x. contain OS Command Injection vulnerabilities that could allow local authenticated users to execute arbitrary privileged commands on the underlying operating system by appending those commands in the Common Name field in the Certificate Generation Request." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Authenticated Root Command Injection." } ] } ] }, "references": { "reference_data": [ { "name": "https://ruckus-www.s3.amazonaws.com/pdf/security/faq-security-advisory-id-092917.txt", "refsource": "CONFIRM", "url": "https://ruckus-www.s3.amazonaws.com/pdf/security/faq-security-advisory-id-092917.txt" } ] } } } }, "cveMetadata": { "assignerOrgId": "87b297d7-335e-4844-9551-11b97995a791", "assignerShortName": "brocade", "cveId": "CVE-2017-6224", "datePublished": "2017-10-13T17:00:00Z", "dateReserved": "2017-02-23T00:00:00", "dateUpdated": "2024-09-16T18:34:15.776Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2017-10-13 17:29
Modified
2025-04-20 01:37
Severity ?
Summary
Ruckus Wireless Zone Director Controller firmware releases ZD9.x, ZD10.0.0.x, ZD10.0.1.x (less than 10.0.1.0.17 MR1 release) and Ruckus Wireless Unleashed AP Firmware releases 200.0.x, 200.1.x, 200.2.x, 200.3.x, 200.4.x. contain OS Command Injection vulnerabilities that could allow local authenticated users to execute arbitrary privileged commands on the underlying operating system by appending those commands in the Common Name field in the Certificate Generation Request.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ruckuswireless | zonedirector_firmware | zd9.9.0.0.205 | |
ruckuswireless | zonedirector_firmware | zd9.9.0.0.212 | |
ruckuswireless | zonedirector_firmware | zd9.9.0.0.216 | |
ruckuswireless | zonedirector_firmware | zd9.10.0.0.218 | |
ruckuswireless | zonedirector_firmware | zd9.13.0.0.103 | |
ruckuswireless | zonedirector_firmware | zd9.13.0.0.209 | |
ruckuswireless | zonedirector | - | |
ruckuswireless | unleashed_firmware | 200.1 | |
ruckuswireless | unleashed_firmware | 200.1.9.12.55 | |
ruckuswireless | unleashed_firmware | 200.3 | |
ruckuswireless | unleashed_firmware | 200.3.9.13.228 | |
ruckuswireless | unleashed_firmware | 200.4.9.13 | |
ruckuswireless | unleashed_firmware | 200.4.9.13.47 | |
ruckuswireless | unleashed | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:zonedirector_firmware:zd9.9.0.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "F0379B3F-72FA-4F1C-A17A-AA0DE0AB9FCD", "vulnerable": true }, { "criteria": "cpe:2.3:o:ruckuswireless:zonedirector_firmware:zd9.9.0.0.212:*:*:*:*:*:*:*", "matchCriteriaId": "7DA0E25F-EA06-42F6-9583-06102ABA2180", "vulnerable": true }, { "criteria": "cpe:2.3:o:ruckuswireless:zonedirector_firmware:zd9.9.0.0.216:*:*:*:*:*:*:*", "matchCriteriaId": "D203A397-7577-4532-8060-52DF61104C47", "vulnerable": true }, { "criteria": "cpe:2.3:o:ruckuswireless:zonedirector_firmware:zd9.10.0.0.218:*:*:*:*:*:*:*", "matchCriteriaId": "87309EB0-29CC-49A7-ACBA-7A2E1D0CB899", "vulnerable": true }, { "criteria": "cpe:2.3:o:ruckuswireless:zonedirector_firmware:zd9.13.0.0.103:*:*:*:*:*:*:*", "matchCriteriaId": "DC8B4C85-F587-4AFA-9BF3-2237DB69FBCE", "vulnerable": true }, { "criteria": "cpe:2.3:o:ruckuswireless:zonedirector_firmware:zd9.13.0.0.209:*:*:*:*:*:*:*", "matchCriteriaId": "834C35BC-614D-4D54-9D17-1616CCE6E206", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:zonedirector:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC847897-E9C7-4247-BC22-E999847E1110", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:unleashed_firmware:200.1:*:*:*:*:*:*:*", "matchCriteriaId": "70338506-5D84-4EAE-BCF7-9BBF8733E3D4", "vulnerable": true }, { "criteria": "cpe:2.3:o:ruckuswireless:unleashed_firmware:200.1.9.12.55:*:*:*:*:*:*:*", "matchCriteriaId": "71C71FBC-6AE3-45CA-A902-84038AC85B6B", "vulnerable": true }, { "criteria": "cpe:2.3:o:ruckuswireless:unleashed_firmware:200.3:*:*:*:*:*:*:*", "matchCriteriaId": "95F01DD9-8F5D-4B2D-B4C2-115CA36E0178", "vulnerable": true }, { "criteria": "cpe:2.3:o:ruckuswireless:unleashed_firmware:200.3.9.13.228:*:*:*:*:*:*:*", "matchCriteriaId": "1ABFF81D-CB46-4836-A37F-7ECEDE373427", "vulnerable": true }, { "criteria": "cpe:2.3:o:ruckuswireless:unleashed_firmware:200.4.9.13:*:*:*:*:*:*:*", "matchCriteriaId": "59125C79-B03D-43FF-AC5A-402C6EC60D2E", "vulnerable": true }, { "criteria": "cpe:2.3:o:ruckuswireless:unleashed_firmware:200.4.9.13.47:*:*:*:*:*:*:*", "matchCriteriaId": "13DDB043-55FE-4D47-BE51-58E434767D6F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:unleashed:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A1920DC-DC78-4708-9D0C-BE6BB73AA8B7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Ruckus Wireless Zone Director Controller firmware releases ZD9.x, ZD10.0.0.x, ZD10.0.1.x (less than 10.0.1.0.17 MR1 release) and Ruckus Wireless Unleashed AP Firmware releases 200.0.x, 200.1.x, 200.2.x, 200.3.x, 200.4.x. contain OS Command Injection vulnerabilities that could allow local authenticated users to execute arbitrary privileged commands on the underlying operating system by appending those commands in the Common Name field in the Certificate Generation Request." }, { "lang": "es", "value": "Ruckus Wireless Zone Director Controller en distribuciones de firmware ZD10.0.0.x, ZD10.0.1.x (anteriores a la distribuci\u00f3n 10.0.1.0.17 MR1) y Ruckus Wireless Unleashed AP Firmware, distribuciones 200.0.x, 200.1.x, 200.2.x, 200.3.x, 200.4.x., contienen vulnerabilidades de inyecci\u00f3n de comandos del sistema operativo que podr\u00edan permitir que usuarios locales autenticados ejecuten comandos arbitrarios con privilegios en el sistema operativo subyacente anexando esos comandos en el campo Common Name en Certificate Generation Request." } ], "id": "CVE-2017-6224", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-10-13T17:29:01.160", "references": [ { "source": "sirt@brocade.com", "tags": [ "Third Party Advisory" ], "url": "https://ruckus-www.s3.amazonaws.com/pdf/security/faq-security-advisory-id-092917.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://ruckus-www.s3.amazonaws.com/pdf/security/faq-security-advisory-id-092917.txt" } ], "sourceIdentifier": "sirt@brocade.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-12-07 07:15
Modified
2025-08-22 21:09
Severity ?
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Summary
A cross-site-scripting vulnerability exists in Ruckus Access Point products (ZoneDirector, SmartZone, and AP Solo). If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who is logging in the product. As for the affected products/models/versions, see the information provided by the vendor listed under [References] section or the list under [Product Status] section.
References
▼ | URL | Tags | |
---|---|---|---|
vultures@jpcert.or.jp | https://jvn.jp/en/jp/JVN45891816/ | Third Party Advisory | |
vultures@jpcert.or.jp | https://support.ruckuswireless.com/security_bulletins/323 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://jvn.jp/en/jp/JVN45891816/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.ruckuswireless.com/security_bulletins/323 | Patch, Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:r750_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "19637FB4-A1EC-4DDB-9FD2-B176427B9933", "versionEndIncluding": "114.0.0.0.6565", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:r750:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA49CB45-1196-4AD7-8AB6-C5593BBF015F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:r650_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2F805AE7-830E-4D88-AA80-40FEC783AC84", "versionEndIncluding": "114.0.0.0.6565", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:r650:-:*:*:*:*:*:*:*", "matchCriteriaId": "951BDA12-0294-472A-9292-F60AC6D4292B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:r730_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4F98CC2D-247B-493F-A1DD-8133622C2AE7", "versionEndIncluding": "114.0.0.0.6565", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:r730:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB28A5E0-6F42-4133-B1D3-1D0116079094", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:t750_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DFCDC4FB-7448-4E19-AF4D-897180F3775B", "versionEndIncluding": "114.0.0.0.6565", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:t750:-:*:*:*:*:*:*:*", "matchCriteriaId": "5C15AA25-82B2-4C02-8361-E8F6179B525A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:r510_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5D6269F0-AFA6-48A9-92D2-3A3250B1E6C0", "versionEndIncluding": "114.0.0.0.6565", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:r510:-:*:*:*:*:*:*:*", "matchCriteriaId": "80B2E8CC-EACE-4A80-9EB1-DADAB8034415", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:e510_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2D2FB77C-1E97-44C5-A961-7F91B1A8AB34", "versionEndIncluding": "114.0.0.0.6565", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:e510:-:*:*:*:*:*:*:*", "matchCriteriaId": "FBF5C92C-C889-4732-BB00-E6D55613E410", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:c110_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6531A85F-9AA8-4A26-9A81-09003B8AAF2E", "versionEndIncluding": "114.0.0.0.6565", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:c110:-:*:*:*:*:*:*:*", "matchCriteriaId": "A77671DB-6197-4C8D-B667-A0081350E5AF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:r320_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7C00DA68-6EA2-4D88-B60C-6980D4953912", "versionEndIncluding": "114.0.0.0.6565", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:r320:-:*:*:*:*:*:*:*", "matchCriteriaId": "93CE3224-85D2-4039-8F24-BB503DFD42C2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:h510_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "843E61F5-DE53-47B3-BF24-B817BE9F334E", "versionEndIncluding": "114.0.0.0.6565", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:h510:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB1FAB48-786A-4FB3-AB6D-3118E94E68C7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:h320_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F625B309-F3BC-4899-B6B4-C460B7502730", "versionEndIncluding": "114.0.0.0.6565", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:h320:-:*:*:*:*:*:*:*", "matchCriteriaId": "282C3A1D-711C-4415-B9BE-A9B518204AEB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:t305_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2ED5CB06-9A07-4EF6-B730-7D24B8E131F7", "versionEndIncluding": "114.0.0.0.6565", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:t305:-:*:*:*:*:*:*:*", "matchCriteriaId": "0500E6E8-D56C-41EC-B9C5-72C5DD955639", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:m510_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3EB3F18F-04F1-4D37-A74C-B12ED64ECDEE", "versionEndIncluding": "114.0.0.0.6565", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:m510:-:*:*:*:*:*:*:*", "matchCriteriaId": "D4AE7200-4090-4B81-A22F-B8553A014D21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:r720_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "73590841-C0E4-423B-89F3-C5E3E5DC3A84", "versionEndIncluding": "114.0.0.0.6565", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:r720:-:*:*:*:*:*:*:*", "matchCriteriaId": "DDFDAF0A-9F5D-4E34-805E-6F27103AAA32", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:r710_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CD213C0E-8D62-43C1-AAAD-72AB2455F4C8", "versionEndIncluding": "114.0.0.0.6565", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:r710:-:*:*:*:*:*:*:*", "matchCriteriaId": "E95884E9-C6AF-4106-A178-9274AD27EF65", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:t710_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1AC75B29-992F-4917-B0A9-6B4C16905E3A", "versionEndIncluding": "114.0.0.0.6565", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:t710:-:*:*:*:*:*:*:*", "matchCriteriaId": "A40B9489-D999-4355-953E-36A7F8DEF299", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:t610_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0273FF13-6329-4A68-B2B1-674D0FDCEACC", "versionEndIncluding": "114.0.0.0.6565", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:t610:-:*:*:*:*:*:*:*", "matchCriteriaId": "210D55AB-9305-4D0B-B9F0-47889D37373B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:r610_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7CA61CD3-AFD8-4C9B-B707-850A352EFF63", "versionEndIncluding": "114.0.0.0.6565", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:r610:-:*:*:*:*:*:*:*", "matchCriteriaId": "4244947C-538E-4B83-B4F4-3DD4F3C22E83", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:t310d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3D3D9629-CDD0-497E-A798-BD68696D7B0A", "versionEndIncluding": "114.0.0.0.6565", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:t310d:-:*:*:*:*:*:*:*", "matchCriteriaId": "C2D3E8C6-4676-4B74-A252-132A26670C64", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:t310s_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "47656F30-691A-4072-B5DF-0B4026133B24", "versionEndIncluding": "114.0.0.0.6565", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:t310s:-:*:*:*:*:*:*:*", "matchCriteriaId": "72378D4B-ADB5-4DE5-BB92-1778BDFD61FC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:t310n_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8508F154-5538-401A-8A1E-192C38A482B4", "versionEndIncluding": "114.0.0.0.6565", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:t310n:-:*:*:*:*:*:*:*", "matchCriteriaId": "2ED4C9B4-7F70-4059-8592-FD3F034160C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:t310c_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D50969FD-837B-49B3-820E-E02CA9CD75E3", "versionEndIncluding": "114.0.0.0.6565", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:t310c:-:*:*:*:*:*:*:*", "matchCriteriaId": "BFB69C4E-2B4F-4F61-8A65-9BA0354F33E3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:t710s_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "11907B93-2CC9-43E7-98E9-B13370225009", "versionEndIncluding": "114.0.0.0.6565", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:t710s:-:*:*:*:*:*:*:*", "matchCriteriaId": "4CFF0772-D853-4781-B326-E3BDEAC78EE0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:t610s_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A6B8C9F8-76A1-4B8C-8FB9-770CB0E7DC94", "versionEndIncluding": "114.0.0.0.6565", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:t610s:-:*:*:*:*:*:*:*", "matchCriteriaId": "752CBB38-F5C6-4666-B062-B5E3B15CA1A0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:r550_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "260442D7-362E-4141-BE55-066154A5B587", "versionEndIncluding": "114.0.0.0.5585", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:r550:-:*:*:*:*:*:*:*", "matchCriteriaId": "215024F9-C68E-4919-9FD5-215CF900A830", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:r850_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "392561BB-1413-44A3-B4D1-CC4A57DC67F1", "versionEndIncluding": "114.0.0.0.5585", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:r850:-:*:*:*:*:*:*:*", "matchCriteriaId": "3A244DE5-A9B3-45BE-8AD1-154546F4F1F4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:t750se_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0F079E97-F62E-4919-A21B-1443146FEB14", "versionEndIncluding": "114.0.0.0.5585", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:t750se:-:*:*:*:*:*:*:*", "matchCriteriaId": "9E1DE3AD-CA13-44CE-ACF1-3DE2D6C691BC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:r310_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0F6AF187-4EC5-4F8A-9FB3-E1FD4F71FA4F", "versionEndIncluding": "110.0.0.0.2014", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:r310:*:*:*:*:*:*:*:*", "matchCriteriaId": "93655935-481F-477B-A0C3-EFFFB822C9D5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:r760_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "22D73A1E-302B-4494-B0CF-48D298A25916", "versionEndIncluding": "118.1.0.0.1274", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:r760:*:*:*:*:*:*:*:*", "matchCriteriaId": "700D0FAA-0964-486A-932B-08CF1A328468", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:r760_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "22D73A1E-302B-4494-B0CF-48D298A25916", "versionEndIncluding": "118.1.0.0.1274", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:r760:*:*:*:*:*:*:*:*", "matchCriteriaId": "700D0FAA-0964-486A-932B-08CF1A328468", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:r560_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1BEFF83F-4F8E-4BFE-B964-2F019A846EF0", "versionEndIncluding": "118.1.0.0.1908", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:r560:*:*:*:*:*:*:*:*", "matchCriteriaId": "75E00EC7-030F-4E90-8747-4AA87C2DA73D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:h550_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DFDDACE4-B572-4E7F-8D7C-333B3108D0F8", "versionEndIncluding": "116.0.0.0.1506", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:h550:*:*:*:*:*:*:*:*", "matchCriteriaId": "843E2FCE-C3EC-406A-8ECB-BA5F51C2DCFF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:h350_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F1056C4F-1A29-474A-AD6F-6911F68ED36E", "versionEndIncluding": "116.0.0.0.3128", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:h350:*:*:*:*:*:*:*:*", "matchCriteriaId": "389825B3-BD3F-48F9-A6EB-238D1485E24D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:t350c_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "561DDAE6-C5A0-4DA8-AC07-0EF7D06A8848", "versionEndIncluding": "116.0.0.0.1543", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:t350c:*:*:*:*:*:*:*:*", "matchCriteriaId": "663BF055-A677-418A-8009-599D7BE04221", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:t350d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C77FF583-1BAF-4042-A5F0-07DF1FC4C5E4", "versionEndIncluding": "116.0.0.0.1543", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:t350d:*:*:*:*:*:*:*:*", "matchCriteriaId": "4323CCB1-EE5E-498F-86F3-00CE6C75F10D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:t350se_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BCC95847-0984-466D-9227-5A44971260F2", "versionEndIncluding": "116.0.0.0.3136", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:t350se:*:*:*:*:*:*:*:*", "matchCriteriaId": "60A48D4A-75D9-486B-896D-7BF11AD3ED6B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:r350_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "004DED59-2353-40D5-997A-E021728E4F23", "versionEndIncluding": "116.0.0.0.1655", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:r350:*:*:*:*:*:*:*:*", "matchCriteriaId": "34B3B5B6-3365-47B2-847E-004489533CDA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:smartzone_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6E0D700D-F65B-49CC-BA09-41B22A6884C1", "versionEndIncluding": "6.1.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:commscope:ruckus_smartzone:-:*:*:*:*:*:*:*", "matchCriteriaId": "92A4B5B7-E8A5-4FE1-8947-7BA90A37516A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:zonedirector_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E1DA133A-1251-4946-BC27-FECABFEA056A", "versionEndIncluding": "10.5.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:zonedirector:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC847897-E9C7-4247-BC22-E999847E1110", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A cross-site-scripting vulnerability exists in Ruckus Access Point products (ZoneDirector, SmartZone, and AP Solo). If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who is logging in the product. As for the affected products/models/versions, see the information provided by the vendor listed under [References] section or the list under [Product Status] section." }, { "lang": "es", "value": "Existe una vulnerabilidad de Cross-Site-Scripting en los productos Ruckus Access Point (ZoneDirector, SmartZone y AP Solo). Si se explota esta vulnerabilidad, se puede ejecutar un script arbitrario en el navegador web del usuario que inicia sesi\u00f3n en el producto. En cuanto a los productos/modelos/versiones afectados, consulte la informaci\u00f3n proporcionada por el proveedor que figura en la secci\u00f3n [Referencias] o la lista en la secci\u00f3n [Estado del producto]." } ], "id": "CVE-2023-49225", "lastModified": "2025-08-22T21:09:15.577", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2023-12-07T07:15:12.880", "references": [ { "source": "vultures@jpcert.or.jp", "tags": [ "Third Party Advisory" ], "url": "https://jvn.jp/en/jp/JVN45891816/" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://support.ruckuswireless.com/security_bulletins/323" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://jvn.jp/en/jp/JVN45891816/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://support.ruckuswireless.com/security_bulletins/323" } ], "sourceIdentifier": "vultures@jpcert.or.jp", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2022-06-27 15:15
Modified
2024-11-21 05:12
Severity ?
Summary
Cross Site Scripting (XSS) vulnerability in Ruckus Wireless ZoneDirector 9.8.3.0.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://ruckus.com | Not Applicable | |
cve@mitre.org | http://zonedirector.com | Not Applicable | |
cve@mitre.org | https://dollahibrahim.blogspot.com/2019/11/cross-site-scripting-on-ruckus.html | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://ruckus.com | Not Applicable | |
af854a3a-2127-422b-91ae-364da2661108 | http://zonedirector.com | Not Applicable | |
af854a3a-2127-422b-91ae-364da2661108 | https://dollahibrahim.blogspot.com/2019/11/cross-site-scripting-on-ruckus.html | Exploit, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ruckuswireless | zonedirector_firmware | 9.8.3.0 | |
ruckuswireless | zonedirector | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ruckuswireless:zonedirector_firmware:9.8.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "51EC9ED4-65ED-4C3D-82AE-8999F7B095FC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ruckuswireless:zonedirector:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC847897-E9C7-4247-BC22-E999847E1110", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross Site Scripting (XSS) vulnerability in Ruckus Wireless ZoneDirector 9.8.3.0." }, { "lang": "es", "value": "Una vulnerabilidad de tipo Cross Site Scripting (XSS) en Ruckus Wireless ZoneDirector versi\u00f3n 9.8.3.0" } ], "id": "CVE-2020-21161", "lastModified": "2024-11-21T05:12:28.437", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-06-27T15:15:07.593", "references": [ { "source": "cve@mitre.org", "tags": [ "Not Applicable" ], "url": "http://ruckus.com" }, { "source": "cve@mitre.org", "tags": [ "Not Applicable" ], "url": "http://zonedirector.com" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://dollahibrahim.blogspot.com/2019/11/cross-site-scripting-on-ruckus.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Not Applicable" ], "url": "http://ruckus.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Not Applicable" ], "url": "http://zonedirector.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://dollahibrahim.blogspot.com/2019/11/cross-site-scripting-on-ruckus.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }