Lucene search

K
cveMitreCVE-2019-19841
HistoryJan 22, 2020 - 9:15 p.m.

CVE-2019-19841

2020-01-2221:15:10
CWE-78
mitre
web.nvd.nist.gov
44
cve
2019
19841
ruckus wireless
unleashed
remote command execution
os commands
post request
xcmd
packet-capture
admin
_cmdstat.jsp
mac attribute

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.5

Confidence

High

EPSS

0.014

Percentile

86.4%

emfd in Ruckus Wireless Unleashed through 200.7.10.102.64 allows remote attackers to execute OS commands via a POST request with the attribute xcmd=packet-capture to admin/_cmdstat.jsp via the mac attribute.

Affected configurations

Nvd
Node
ruckuswirelessunleashedRange<200.7.10.202.94
AND
ruckuswirelessc110Match-
OR
ruckuswirelesse510Match-
OR
ruckuswirelessh320Match-
OR
ruckuswirelessh510Match-
OR
ruckuswirelessm510Match-
OR
ruckuswirelessr310Match-
OR
ruckuswirelessr320Match-
OR
ruckuswirelessr510Match-
OR
ruckuswirelessr610Match-
OR
ruckuswirelessr710Match-
OR
ruckuswirelessr720Match-
OR
ruckuswirelesst310Match-
OR
ruckuswirelesst610Match-
OR
ruckuswirelesst710Match-
Node
ruckuswirelesszonedirector_1200_firmwareRange<9.10.2.0.84
OR
ruckuswirelesszonedirector_1200_firmwareRange9.12.09.12.3.0.136
OR
ruckuswirelesszonedirector_1200_firmwareRange9.13.010.0.1.0.90
OR
ruckuswirelesszonedirector_1200_firmwareRange10.1.010.1.2.0.275
OR
ruckuswirelesszonedirector_1200_firmwareRange10.2.010.2.1.0.147
OR
ruckuswirelesszonedirector_1200_firmwareRange10.3.010.3.1.0.21
AND
ruckuswirelesszonedirector_1200Match-
VendorProductVersionCPE
ruckuswirelessunleashed*cpe:2.3:o:ruckuswireless:unleashed:*:*:*:*:*:*:*:*
ruckuswirelessc110-cpe:2.3:h:ruckuswireless:c110:-:*:*:*:*:*:*:*
ruckuswirelesse510-cpe:2.3:h:ruckuswireless:e510:-:*:*:*:*:*:*:*
ruckuswirelessh320-cpe:2.3:h:ruckuswireless:h320:-:*:*:*:*:*:*:*
ruckuswirelessh510-cpe:2.3:h:ruckuswireless:h510:-:*:*:*:*:*:*:*
ruckuswirelessm510-cpe:2.3:h:ruckuswireless:m510:-:*:*:*:*:*:*:*
ruckuswirelessr310-cpe:2.3:h:ruckuswireless:r310:-:*:*:*:*:*:*:*
ruckuswirelessr320-cpe:2.3:h:ruckuswireless:r320:-:*:*:*:*:*:*:*
ruckuswirelessr510-cpe:2.3:h:ruckuswireless:r510:-:*:*:*:*:*:*:*
ruckuswirelessr610-cpe:2.3:h:ruckuswireless:r610:-:*:*:*:*:*:*:*
Rows per page:
1-10 of 171

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.5

Confidence

High

EPSS

0.014

Percentile

86.4%

Related for CVE-2019-19841