Lucene search

K
cveJpcertCVE-2023-49225
HistoryDec 07, 2023 - 7:15 a.m.

CVE-2023-49225

2023-12-0707:15:12
CWE-79
jpcert
web.nvd.nist.gov
26
cve-2023-49225
cross-site scripting
ruckus access point
zonedirector
smartzone
ap solo
vulnerability
nvd
security

CVSS3

6.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

AI Score

6.3

Confidence

High

EPSS

0.001

Percentile

17.0%

A cross-site-scripting vulnerability exists in Ruckus Access Point products (ZoneDirector, SmartZone, and AP Solo). If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who is logging in the product. As for the affected products/models/versions, see the information provided by the vendor listed under [References] section or the list under [Product Status] section.

Affected configurations

Nvd
Vulners
Node
ruckuswirelessr750Match-
AND
ruckuswirelessr750_firmwareRange114.0.0.0.6565
Node
ruckuswirelessr650Match-
AND
ruckuswirelessr650_firmwareRange114.0.0.0.6565
Node
ruckuswirelessr730Match-
AND
ruckuswirelessr730_firmwareRange114.0.0.0.6565
Node
ruckuswirelesst750Match-
AND
ruckuswirelesst750_firmwareRange114.0.0.0.6565
Node
ruckuswirelessr510Match-
AND
ruckuswirelessr510_firmwareRange114.0.0.0.6565
Node
ruckuswirelesse510_firmwareRange114.0.0.0.6565
AND
ruckuswirelesse510Match-
Node
ruckuswirelessc110_firmwareRange114.0.0.0.6565
AND
ruckuswirelessc110Match-
Node
ruckuswirelessr320_firmwareRange114.0.0.0.6565
AND
ruckuswirelessr320Match-
Node
ruckuswirelessh510_firmwareRange114.0.0.0.6565
AND
ruckuswirelessh510Match-
Node
ruckuswirelessh320_firmwareRange114.0.0.0.6565
AND
ruckuswirelessh320Match-
Node
ruckuswirelesst305_firmwareRange114.0.0.0.6565
AND
ruckuswirelesst305Match-
Node
ruckuswirelessm510_firmwareRange114.0.0.0.6565
AND
ruckuswirelessm510Match-
Node
ruckuswirelessr720_firmwareRange114.0.0.0.6565
AND
ruckuswirelessr720Match-
Node
ruckuswirelessr710_firmwareRange114.0.0.0.6565
AND
ruckuswirelessr710Match-
Node
ruckuswirelesst710_firmwareRange114.0.0.0.6565
AND
ruckuswirelesst710Match-
Node
ruckuswirelesst610_firmwareRange114.0.0.0.6565
AND
ruckuswirelesst610Match-
Node
ruckuswirelessr610_firmwareRange114.0.0.0.6565
AND
ruckuswirelessr610Match-
Node
ruckuswirelesst310d_firmwareRange114.0.0.0.6565
AND
ruckuswirelesst310dMatch-
Node
ruckuswirelesst310s_firmwareRange114.0.0.0.6565
AND
ruckuswirelesst310sMatch-
Node
ruckuswirelesst310n_firmwareRange114.0.0.0.6565
AND
ruckuswirelesst310nMatch-
Node
ruckuswirelesst310c_firmwareRange114.0.0.0.6565
AND
ruckuswirelesst310cMatch-
Node
ruckuswirelesst710s_firmwareRange114.0.0.0.6565
AND
ruckuswirelesst710sMatch-
Node
ruckuswirelesst610s_firmwareRange114.0.0.0.6565
AND
ruckuswirelesst610sMatch-
Node
ruckuswirelessr550_firmwareRange114.0.0.0.5585
AND
ruckuswirelessr550Match-
Node
ruckuswirelessr850_firmwareRange114.0.0.0.5585
AND
ruckuswirelessr850Match-
Node
ruckuswirelesst750se_firmwareRange114.0.0.0.5585
AND
ruckuswirelesst750seMatch-
Node
ruckuswirelessr310_firmwareRange110.0.0.0.2014
AND
ruckuswirelessr310
Node
ruckuswirelessr760_firmwareRange118.1.0.0.1274
AND
ruckuswirelessr760
Node
ruckuswirelessr760_firmwareRange118.1.0.0.1274
AND
ruckuswirelessr760
Node
ruckuswirelessr560_firmwareRange118.1.0.0.1908
AND
ruckuswirelessr560
Node
ruckuswirelessh550_firmwareRange116.0.0.0.1506
AND
ruckuswirelessh550
Node
ruckuswirelessh350_firmwareRange116.0.0.0.3128
AND
ruckuswirelessh350
Node
ruckuswirelesst350c_firmwareRange116.0.0.0.1543
AND
ruckuswirelesst350c
Node
ruckuswirelesst350d_firmwareRange116.0.0.0.1543
AND
ruckuswirelesst350d
Node
ruckuswirelesst350se_firmwareRange116.0.0.0.3136
AND
ruckuswirelesst350se
Node
ruckuswirelessr350_firmwareRange116.0.0.0.1655
AND
ruckuswirelessr350
Node
ruckuswirelesssmartzone_firmwareRange6.1.1
AND
ruckuswirelesssmartzoneMatch-
Node
ruckuswirelesszonedirector_firmwareRange10.5.1
AND
ruckuswirelesszonedirectorMatch-
VendorProductVersionCPE
ruckuswirelessr750-cpe:2.3:h:ruckuswireless:r750:-:*:*:*:*:*:*:*
ruckuswirelessr750_firmware*cpe:2.3:o:ruckuswireless:r750_firmware:*:*:*:*:*:*:*:*
ruckuswirelessr650-cpe:2.3:h:ruckuswireless:r650:-:*:*:*:*:*:*:*
ruckuswirelessr650_firmware*cpe:2.3:o:ruckuswireless:r650_firmware:*:*:*:*:*:*:*:*
ruckuswirelessr730-cpe:2.3:h:ruckuswireless:r730:-:*:*:*:*:*:*:*
ruckuswirelessr730_firmware*cpe:2.3:o:ruckuswireless:r730_firmware:*:*:*:*:*:*:*:*
ruckuswirelesst750-cpe:2.3:h:ruckuswireless:t750:-:*:*:*:*:*:*:*
ruckuswirelesst750_firmware*cpe:2.3:o:ruckuswireless:t750_firmware:*:*:*:*:*:*:*:*
ruckuswirelessr510-cpe:2.3:h:ruckuswireless:r510:-:*:*:*:*:*:*:*
ruckuswirelessr510_firmware*cpe:2.3:o:ruckuswireless:r510_firmware:*:*:*:*:*:*:*:*
Rows per page:
1-10 of 741

CNA Affected

[
  {
    "vendor": "CommScope, Inc.",
    "product": "ZoneDirector",
    "versions": [
      {
        "version": "10.5.1 and earlier ",
        "status": "affected"
      }
    ]
  },
  {
    "vendor": "CommScope, Inc.",
    "product": "SmartZone",
    "versions": [
      {
        "version": "6.1.1 and earlier ",
        "status": "affected"
      }
    ]
  },
  {
    "vendor": "CommScope, Inc.",
    "product": "AP Solo R750",
    "versions": [
      {
        "version": "114.0.0.0.6565 and earlier ",
        "status": "affected"
      }
    ]
  },
  {
    "vendor": "CommScope, Inc.",
    "product": "AP Solo R650",
    "versions": [
      {
        "version": "114.0.0.0.6565 and earlier ",
        "status": "affected"
      }
    ]
  },
  {
    "vendor": "CommScope, Inc.",
    "product": "AP Solo R730",
    "versions": [
      {
        "version": "114.0.0.0.6565 and earlier ",
        "status": "affected"
      }
    ]
  },
  {
    "vendor": "CommScope, Inc.",
    "product": "AP Solo T750",
    "versions": [
      {
        "version": "114.0.0.0.6565 and earlier ",
        "status": "affected"
      }
    ]
  },
  {
    "vendor": "CommScope, Inc.",
    "product": "AP Solo R550",
    "versions": [
      {
        "version": "114.0.0.0.5585 and earlier ",
        "status": "affected"
      }
    ]
  },
  {
    "vendor": "CommScope, Inc.",
    "product": "AP Solo R850",
    "versions": [
      {
        "version": "114.0.0.0.5585 and earlier ",
        "status": "affected"
      }
    ]
  },
  {
    "vendor": "CommScope, Inc.",
    "product": "AP Solo T750SE",
    "versions": [
      {
        "version": "114.0.0.0.5585 and earlier ",
        "status": "affected"
      }
    ]
  },
  {
    "vendor": "CommScope, Inc.",
    "product": "AP Solo R510",
    "versions": [
      {
        "version": "114.0.0.0.6565 and earlier ",
        "status": "affected"
      }
    ]
  },
  {
    "vendor": "CommScope, Inc.",
    "product": "AP Solo T310D",
    "versions": [
      {
        "version": "114.0.0.0.6565 and earlier ",
        "status": "affected"
      }
    ]
  },
  {
    "vendor": "CommScope, Inc.",
    "product": "AP Solo E510",
    "versions": [
      {
        "version": "114.0.0.0.6565 and earlier ",
        "status": "affected"
      }
    ]
  },
  {
    "vendor": "CommScope, Inc.",
    "product": "AP Solo C110",
    "versions": [
      {
        "version": "114.0.0.0.6565 and earlier ",
        "status": "affected"
      }
    ]
  },
  {
    "vendor": "CommScope, Inc.",
    "product": "AP Solo R320",
    "versions": [
      {
        "version": "114.0.0.0.6565 and earlier ",
        "status": "affected"
      }
    ]
  },
  {
    "vendor": "CommScope, Inc.",
    "product": "AP Solo H510",
    "versions": [
      {
        "version": "114.0.0.0.6565 and earlier ",
        "status": "affected"
      }
    ]
  },
  {
    "vendor": "CommScope, Inc.",
    "product": "AP Solo H320",
    "versions": [
      {
        "version": "114.0.0.0.6565 and earlier ",
        "status": "affected"
      }
    ]
  },
  {
    "vendor": "CommScope, Inc.",
    "product": "AP Solo T310S",
    "versions": [
      {
        "version": "114.0.0.0.6565 and earlier ",
        "status": "affected"
      }
    ]
  },
  {
    "vendor": "CommScope, Inc.",
    "product": "AP Solo T310N",
    "versions": [
      {
        "version": "114.0.0.0.6565 and earlier ",
        "status": "affected"
      }
    ]
  },
  {
    "vendor": "CommScope, Inc.",
    "product": "AP Solo T310C",
    "versions": [
      {
        "version": "114.0.0.0.6565 and earlier ",
        "status": "affected"
      }
    ]
  },
  {
    "vendor": "CommScope, Inc.",
    "product": "AP Solo T305",
    "versions": [
      {
        "version": "114.0.0.0.6565 and earlier ",
        "status": "affected"
      }
    ]
  },
  {
    "vendor": "CommScope, Inc.",
    "product": "AP Solo M510",
    "versions": [
      {
        "version": "114.0.0.0.6565 and earlier ",
        "status": "affected"
      }
    ]
  },
  {
    "vendor": "CommScope, Inc.",
    "product": "AP Solo R720",
    "versions": [
      {
        "version": "114.0.0.0.6565 and earlier ",
        "status": "affected"
      }
    ]
  },
  {
    "vendor": "CommScope, Inc.",
    "product": "AP Solo R710",
    "versions": [
      {
        "version": "114.0.0.0.6565 and earlier ",
        "status": "affected"
      }
    ]
  },
  {
    "vendor": "CommScope, Inc.",
    "product": "AP Solo T710",
    "versions": [
      {
        "version": "114.0.0.0.6565 and earlier ",
        "status": "affected"
      }
    ]
  },
  {
    "vendor": "CommScope, Inc.",
    "product": "AP Solo T710s",
    "versions": [
      {
        "version": "114.0.0.0.6565 and earlier ",
        "status": "affected"
      }
    ]
  },
  {
    "vendor": "CommScope, Inc.",
    "product": "AP Solo T610",
    "versions": [
      {
        "version": "114.0.0.0.6565 and earlier ",
        "status": "affected"
      }
    ]
  },
  {
    "vendor": "CommScope, Inc.",
    "product": "AP Solo T610s",
    "versions": [
      {
        "version": "114.0.0.0.6565 and earlier ",
        "status": "affected"
      }
    ]
  },
  {
    "vendor": "CommScope, Inc.",
    "product": "AP Solo R610",
    "versions": [
      {
        "version": "114.0.0.0.6565 and earlier ",
        "status": "affected"
      }
    ]
  },
  {
    "vendor": "CommScope, Inc.",
    "product": "AP Solo R310",
    "versions": [
      {
        "version": "110.0.0.0.2014 and earlier ",
        "status": "affected"
      }
    ]
  },
  {
    "vendor": "CommScope, Inc.",
    "product": "AP Solo R760",
    "versions": [
      {
        "version": "118.1.0.0.1274 and earlier ",
        "status": "affected"
      }
    ]
  },
  {
    "vendor": "CommScope, Inc.",
    "product": "AP Solo R560",
    "versions": [
      {
        "version": "118.1.0.0.1908 and earlier ",
        "status": "affected"
      }
    ]
  },
  {
    "vendor": "CommScope, Inc.",
    "product": "AP Solo H550",
    "versions": [
      {
        "version": "116.0.0.0.1506 and earlier ",
        "status": "affected"
      }
    ]
  },
  {
    "vendor": "CommScope, Inc.",
    "product": "AP Solo H350",
    "versions": [
      {
        "version": "116.0.0.0.3128 and earlier ",
        "status": "affected"
      }
    ]
  },
  {
    "vendor": "CommScope, Inc.",
    "product": "AP Solo T350c",
    "versions": [
      {
        "version": "116.0.0.0.1543 and earlier ",
        "status": "affected"
      }
    ]
  },
  {
    "vendor": "CommScope, Inc.",
    "product": "AP Solo T350d",
    "versions": [
      {
        "version": "116.0.0.0.1543 and earlier ",
        "status": "affected"
      }
    ]
  },
  {
    "vendor": "CommScope, Inc.",
    "product": "AP Solo T350se",
    "versions": [
      {
        "version": "116.0.0.0.3136 and earlier ",
        "status": "affected"
      }
    ]
  },
  {
    "vendor": "CommScope, Inc.",
    "product": "AP Solo R350",
    "versions": [
      {
        "version": "116.0.0.0.1655 and earlier ",
        "status": "affected"
      }
    ]
  }
]

CVSS3

6.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

AI Score

6.3

Confidence

High

EPSS

0.001

Percentile

17.0%

Related for CVE-2023-49225