Ruckus Wireless Zoneflex 2942 Wireless Access Point vulnerable to authentication bypass

2013-10-10T00:00:00
ID VU:742932
Type cert
Reporter CERT
Modified 2013-10-10T16:32:00

Description

Overview

Ruckus Wireless Zoneflex 2942 Wireless Access Point version 9.6.0.0.267 and possibly earlier versions contains an authentication bypass vulnerability (CWE-592).

Description

CWE-592: Authentication Bypass Issues

Ruckus Wireless Zoneflex 2942 Wireless Access Point version 9.6.0.0.267 contains an authentication bypass vulnerability. A local unauthenticated attacker may attempt to login with any credentials and after receiving the authentication failure message, the user can remove the /login.asp portion of the URI to bypass the login page. The attacker will not be able to browse to the other configuration pages of the device via the graphical user interface, but they can then manually edit the URI to gain access to the following pages:
/``configuration/wireless.asp
/configuration/local_network.asp
/configuration/internet.asp
/configuration/device.asp
/maintenance/upgrade.asp
/maintenance/reboot.asp


Impact

An unauthenticated attacker may be able to directly access the device's configuration web pages. The attacker may also be able to reboot the access point, resulting in a denial of service.


Solution

We are currently unaware of a practical solution to this problem. Please consider the following workarounds.


Restrict network access

Restrict network access to the Ruckus Wireless Zoneflex 2942 Wireless Access Point web interface and other devices using open protocols like HTTP.

Disable WAN device management

Restrict network access to the Ruckus Wireless Zoneflex 2942 Wireless Access Point web interface from Internet connections.


Vendor Information

742932

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

Ruckus Wireless Affected

Notified: August 19, 2013 Updated: October 03, 2013

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

CVSS Metrics

Group | Score | Vector
---|---|---
Base | 5.9 | AV:L/AC:M/Au:N/C:P/I:C/A:P
Temporal | 4.8 | E:POC/RL:ND/RC:UC
Environmental | 1.2 | CDP:ND/TD:L/CR:ND/IR:ND/AR:ND

References

  • <http://cwe.mitre.org/data/definitions/592.html>
  • <http://www.ruckuswireless.com/products/zoneflex-indoor/2942>

Acknowledgements

Thanks to MyExploit for reporting this vulnerability.

This document was written by Adam Rauf.

Other Information

CVE IDs: | CVE-2013-5030
---|---
Date Public: | 2013-10-10
Date First Published: | 2013-10-10
Date Last Updated: | 2013-10-10 16:32 UTC
Document Revision: | 18