Lucene search

K
cve[email protected]CVE-2017-6229
HistoryFeb 14, 2018 - 7:29 p.m.

CVE-2017-6229

2018-02-1419:29:00
CWE-78
web.nvd.nist.gov
25
ruckus networks
ap firmware
zone director
command injection
cli
security vulnerability
nvd
cve-2017-6229

9 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:C/I:C/A:C

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

8.8 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

55.8%

Ruckus Networks Unleashed AP firmware releases before 200.6.10.1.x and Ruckus Networks Zone Director firmware releases 10.1.0.0.x, 9.10.2.0.x, 9.12.3.0.x, 9.13.3.0.x, 10.0.1.0.x or before contain authenticated Root Command Injection in the CLI that could allow authenticated valid users to execute privileged commands on the respective systems.

Affected configurations

NVD
Node
ruckuswirelessr500_firmwareRange<200.6.10.1.0
AND
ruckuswirelessr500Match-
Node
ruckuswirelessr600_firmwareRange<200.6.10.1.0
AND
ruckuswirelessr600Match-
Node
ruckuswirelessr310Match-
AND
ruckuswirelessr310_firmwareRange<200.6.10.1.0
Node
ruckuswirelessh320Match-
AND
ruckuswirelessh320_firmwareRange<200.6.10.1.0
Node
ruckuswirelessh510Match-
AND
ruckuswirelessh510_firmwareRange<200.6.10.1.0
Node
ruckuswirelessr710Match-
AND
ruckuswirelessr710_firmwareRange<200.6.10.1.0
Node
ruckuswirelessr720Match-
AND
ruckuswirelessr720_firmwareRange<200.6.10.1.0
Node
ruckuswirelesst300Match-
AND
ruckuswirelesst300_firmwareRange<200.6.10.1.0
Node
ruckuswirelesst301Match-
AND
ruckuswirelesst301_firmwareRange<200.6.10.1.0
Node
ruckuswirelesst300eMatch-
AND
ruckuswirelesst300e_firmwareRange<200.6.10.1.0
Node
ruckuswirelesst610_firmwareRange<200.6.10.1.0
AND
ruckuswirelesst610Match-
Node
ruckuswirelesst710_firmwareRange<200.6.10.1.0
AND
ruckuswirelesst710Match-
Node
ruckuswirelessr510_firmwareRange<200.6.10.1.0
AND
ruckuswirelessr510Match-
Node
ruckuswirelesszonedirector_1200_firmwareRange9.10.2.0.119.10.2.0.53
OR
ruckuswirelesszonedirector_1200_firmwareRange9.12.3.0.289.12.3.0.83
OR
ruckuswirelesszonedirector_1200_firmwareRange9.13.3.0.229.13.3.0.145
OR
ruckuswirelesszonedirector_1200_firmwareRange10.0.1.0.1710.0.1.0.44
OR
ruckuswirelesszonedirector_1200_firmwareMatch10.1.0.0.1515
AND
ruckuswirelesszonedirector_1200Match-
Node
ruckuswirelesszonedirector_3000_firmwareRange9.10.2.0.119.10.2.0.53
OR
ruckuswirelesszonedirector_3000_firmwareRange9.12.3.0.289.12.3.0.83
OR
ruckuswirelesszonedirector_3000_firmwareRange9.13.3.0.229.13.3.0.145
OR
ruckuswirelesszonedirector_3000_firmwareRange10.0.1.0.1710.0.1.0.44
OR
ruckuswirelesszonedirector_3000_firmwareMatch10.1.0.0.1515
AND
ruckuswirelesszonedirector_3000Match-

CNA Affected

[
  {
    "product": "Ruckus Networks Unleashed APs and Zone Director",
    "vendor": "Brocade Communications Systems, Inc.",
    "versions": [
      {
        "status": "affected",
        "version": "Unleashed AP firmware releases before 200.6.10.1.x and ZD firmware releases 10.1.0.0.x, 9.10.2.0.x, 9.12.3.0.x,9.13.3.0.x, 10.0.1.0.x or before"
      }
    ]
  }
]

9 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:C/I:C/A:C

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

8.8 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

55.8%

Related for CVE-2017-6229