Lucene search

K
packetstormMyexploitPACKETSTORM:124099
HistoryNov 20, 2013 - 12:00 a.m.

Ruckus Wireless Zoneflex 2942 Authentication Bypass

2013-11-2000:00:00
myexploit
packetstormsecurity.com
39

0.023 Low

EPSS

Percentile

88.4%

`Exploit Title: Ruckus Wireless Zoneflex 2942 Wireless Access Point vulnerable to authentication bypass  
Date: 10/10/2013  
Exploit Author: myexploit  
Vendor Homepage: http://www.ruckuswireless.com/  
Version: 2942 Wireless Access Point version 9.6.0.0.267  
CVE : CVE-2013-5030  
  
Video to show the exploit  
  
http://www.youtube.com/watch?v=KAAQZZs4_n4  
  
Overview  
  
Ruckus Wireless Zoneflex 2942 Wireless Access Point version 9.6.0.0.267 and possibly earlier versions contains an authentication bypass vulnerability (CWE-592).  
Description  
  
CWE-592: Authentication Bypass Issues  
  
Ruckus Wireless Zoneflex 2942 Wireless Access Point version 9.6.0.0.267 contains an authentication bypass vulnerability. A local unauthenticated attacker may attempt to login with any credentials and after receiving the authentication failure message, the user can remove the /login.asp portion of the URI to bypass the login page. The attacker will not be able to browse to the other configuration pages of the device via the graphical user interface, but they can then manually edit the URI to gain access to the following pages:  
/configuration/wireless.asp  
/configuration/local_network.asp  
/configuration/internet.asp  
/configuration/device.asp  
/maintenance/upgrade.asp  
/maintenance/reboot.asp  
Impact  
  
An unauthenticated attacker may be able to directly access the device's configuration web pages. The attacker may also be able to reboot the access point, resulting in a denial of service.  
Solution  
  
We are currently unaware of a practical solution to this problem. Please consider the following workarounds.  
  
`

0.023 Low

EPSS

Percentile

88.4%