Vulnerability Name:

CVE-2017-6229

Assigned:2017-02-23
Published:2018-02-02
Updated:2018-03-12
Summary:Ruckus Networks Unleashed AP firmware releases before 200.6.10.1.x and Ruckus Networks Zone Director firmware releases 10.1.0.0.x, 9.10.2.0.x, 9.12.3.0.x, 9.13.3.0.x, 10.0.1.0.x or before contain authenticated Root Command Injection in the CLI that could allow authenticated valid users to execute privileged commands on the respective systems.
CVSS v3 Severity:8.8 High (CVSS v3 Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
7.7 High (Temporal CVSS v3 Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): Low
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
8.8 High (CCN CVSS v3 Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
7.7 High (CCN Temporal CVSS v3 Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): Low
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:9.0 High (CVSS v2 Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
9.0 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-78
References:Source: XF
Type: UNKNOWN
ruckus-cve20176229-cmd-exec(139167)

Source: CONFIRM
Type: VENDOR_ADVISORY
https://ruckus-www.s3.amazonaws.com/pdf/security/faq-security-advisory-id-20180202-v1.0.txt

Vulnerable Configuration:Configuration 1:
  • cpe:/h:ruckuswireless:r500:-:*:*:*:*:*:*:*

  • Configuration 2:
  • cpe:/h:ruckuswireless:r600:-:*:*:*:*:*:*:*

  • Configuration 3:
  • cpe:/h:ruckuswireless:r310:-:*:*:*:*:*:*:*

  • Configuration 4:
  • cpe:/h:ruckuswireless:h320:-:*:*:*:*:*:*:*

  • Configuration 5:
  • cpe:/h:ruckuswireless:h510:-:*:*:*:*:*:*:*

  • Configuration 6:
  • cpe:/h:ruckuswireless:r710:-:*:*:*:*:*:*:*

  • Configuration 7:
  • cpe:/h:ruckuswireless:r720:-:*:*:*:*:*:*:*

  • Configuration 8:
  • cpe:/h:ruckuswireless:t300:-:*:*:*:*:*:*:*

  • Configuration 9:
  • cpe:/h:ruckuswireless:t301:-:*:*:*:*:*:*:*

  • Configuration 10:
  • cpe:/h:ruckuswireless:t300e:-:*:*:*:*:*:*:*

  • Configuration 11:
  • cpe:/h:ruckuswireless:t610:-:*:*:*:*:*:*:*

  • Configuration 12:
  • cpe:/o:ruckuswireless:t710:-:*:*:*:*:*:*:*

  • Configuration 13:
  • cpe:/h:ruckuswireless:r510:-:*:*:*:*:*:*:*

  • Configuration 14:
  • cpe:/o:ruckuswireless:zonedirector_1200_firmware:10.1.0.0.1515:*:*:*:*:*:*:*
  • AND
  • cpe:/h:ruckuswireless:zonedirector_1200:-:*:*:*:*:*:*:*

  • Configuration 15:
  • cpe:/o:ruckuswireless:zonedirector_3000_firmware:10.1.0.0.1515:*:*:*:*:*:*:*
  • AND
  • cpe:/h:ruckuswireless:zonedirector_3000:-:*:*:*:*:*:*:*

  • Denotes that component is vulnerable
    BACK
    ruckuswireless r500 -
    ruckuswireless r600 -
    ruckuswireless r310 -
    ruckuswireless h320 -
    ruckuswireless h510 -
    ruckuswireless r710 -
    ruckuswireless r720 -
    ruckuswireless t300 -
    ruckuswireless t301 -
    ruckuswireless t300e -
    ruckuswireless t610 -
    ruckuswireless t710 -
    ruckuswireless r510 -
    ruckuswireless zonedirector 1200 firmware 10.1.0.0.1515
    ruckuswireless zonedirector 1200 -
    ruckuswireless zonedirector 3000 firmware 10.1.0.0.1515
    ruckuswireless zonedirector 3000 -