Lucene search

K
cveMitreCVE-2020-26878
HistoryOct 26, 2020 - 8:15 p.m.

CVE-2020-26878

2020-10-2620:15:14
CWE-78
mitre
web.nvd.nist.gov
66
ruckus
1.5.1.0.21
remote command injection
authenticated user
api
web.py
cve-2020-26878
nvd

CVSS2

9

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:C/I:C/A:C

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

8.9

Confidence

High

EPSS

0.904

Percentile

98.9%

Ruckus through 1.5.1.0.21 is affected by remote command injection. An authenticated user can submit a query to the API (/service/v1/createUser endpoint), injecting arbitrary commands that will be executed as root user via web.py.

Affected configurations

Nvd
Node
commscoperuckus_vriotRange1.5.1.0.21
AND
commscoperuckus_iot_moduleMatch-
VendorProductVersionCPE
commscoperuckus_vriot*cpe:2.3:a:commscope:ruckus_vriot:*:*:*:*:*:*:*:*
commscoperuckus_iot_module-cpe:2.3:h:commscope:ruckus_iot_module:-:*:*:*:*:*:*:*

CVSS2

9

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:C/I:C/A:C

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

8.9

Confidence

High

EPSS

0.904

Percentile

98.9%