Lucene search

K
nvd[email protected]NVD:CVE-2020-26879
HistoryOct 26, 2020 - 8:15 p.m.

CVE-2020-26879

2020-10-2620:15:14
CWE-798
web.nvd.nist.gov
4
ruckus vriot
api backdoor
validate_token.py
unauthenticated attacker
service api

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.384

Percentile

97.2%

Ruckus vRioT through 1.5.1.0.21 has an API backdoor that is hardcoded into validate_token.py. An unauthenticated attacker can interact with the service API by using a backdoor value as the Authorization header.

Affected configurations

Nvd
Node
commscoperuckus_vriotRange1.5.1.0.21
AND
commscoperuckus_iot_moduleMatch-
VendorProductVersionCPE
commscoperuckus_vriot*cpe:2.3:a:commscope:ruckus_vriot:*:*:*:*:*:*:*:*
commscoperuckus_iot_module-cpe:2.3:h:commscope:ruckus_iot_module:-:*:*:*:*:*:*:*

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.384

Percentile

97.2%