Lucene search

K
cve[email protected]CVE-2017-6224
HistoryOct 13, 2017 - 5:29 p.m.

CVE-2017-6224

2017-10-1317:29:01
CWE-78
web.nvd.nist.gov
28
ruckus wireless
zone director
unleashed ap
firmware
vulnerability
os command injection
cve-2017-6224
nvd

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

8.8 High

AI Score

Confidence

High

9.3 High

CVSS2

Access Vector

Access Complexity

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.001 Low

EPSS

Percentile

42.3%

Ruckus Wireless Zone Director Controller firmware releases ZD9.x, ZD10.0.0.x, ZD10.0.1.x (less than 10.0.1.0.17 MR1 release) and Ruckus Wireless Unleashed AP Firmware releases 200.0.x, 200.1.x, 200.2.x, 200.3.x, 200.4.x. contain OS Command Injection vulnerabilities that could allow local authenticated users to execute arbitrary privileged commands on the underlying operating system by appending those commands in the Common Name field in the Certificate Generation Request.

Affected configurations

NVD
Node
ruckuswirelesszonedirector_firmwareMatchzd9.9.0.0.205
OR
ruckuswirelesszonedirector_firmwareMatchzd9.9.0.0.212
OR
ruckuswirelesszonedirector_firmwareMatchzd9.9.0.0.216
OR
ruckuswirelesszonedirector_firmwareMatchzd9.10.0.0.218
OR
ruckuswirelesszonedirector_firmwareMatchzd9.13.0.0.103
OR
ruckuswirelesszonedirector_firmwareMatchzd9.13.0.0.209
AND
ruckuswirelesszonedirectorMatch-
Node
ruckuswirelessunleashed_firmwareMatch200.1
OR
ruckuswirelessunleashed_firmwareMatch200.1.9.12.55
OR
ruckuswirelessunleashed_firmwareMatch200.3
OR
ruckuswirelessunleashed_firmwareMatch200.3.9.13.228
OR
ruckuswirelessunleashed_firmwareMatch200.4.9.13
OR
ruckuswirelessunleashed_firmwareMatch200.4.9.13.47
AND
ruckuswirelessunleashedMatch-

CNA Affected

[
  {
    "product": "Zone Director Controller and Unleashed AP Firmware",
    "vendor": "Brocade Communications Systems, Inc.",
    "versions": [
      {
        "status": "affected",
        "version": "ZD9.x"
      },
      {
        "status": "affected",
        "version": "ZD10.0.0.x"
      },
      {
        "status": "affected",
        "version": "ZD10.0.1.x"
      },
      {
        "status": "affected",
        "version": "200.x"
      },
      {
        "status": "affected",
        "version": "200.2.x"
      },
      {
        "status": "affected",
        "version": "200.3.x"
      },
      {
        "status": "affected",
        "version": "200.4.x"
      }
    ]
  }
]

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

8.8 High

AI Score

Confidence

High

9.3 High

CVSS2

Access Vector

Access Complexity

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.001 Low

EPSS

Percentile

42.3%

Related for CVE-2017-6224