CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
60.9%
In Ruckus R310 10.5.1.0.199, Ruckus R500 10.5.1.0.199, Ruckus R600 10.5.1.0.199, Ruckus T300 10.5.1.0.199, Ruckus T301n 10.5.1.0.199, Ruckus T301s 10.5.1.0.199, SmartCell Gateway 200 (SCG200) before 3.6.2.0.795, SmartZone 100 (SZ-100) before 3.6.2.0.795, SmartZone 300 (SZ300) before 3.6.2.0.795, Virtual SmartZone (vSZ) before 3.6.2.0.795, ZoneDirector 1100 9.10.2.0.130, ZoneDirector 1200 10.2.1.0.218, ZoneDirector 3000 10.2.1.0.218, ZoneDirector 5000 10.0.1.0.151, a vulnerability allows attackers to exploit the official image signature to force injection unauthorized image signature.
Vendor | Product | Version | CPE |
---|---|---|---|
ruckuswireless | r310 | - | cpe:2.3:h:ruckuswireless:r310:-:*:*:*:*:*:*:* |
ruckuswireless | r310_firmware | 10.5.1.0.199 | cpe:2.3:o:ruckuswireless:r310_firmware:10.5.1.0.199:*:*:*:*:*:*:* |
ruckuswireless | r500 | - | cpe:2.3:h:ruckuswireless:r500:-:*:*:*:*:*:*:* |
ruckuswireless | r500_firmware | 10.5.1.0.199 | cpe:2.3:o:ruckuswireless:r500_firmware:10.5.1.0.199:*:*:*:*:*:*:* |
ruckuswireless | r600 | - | cpe:2.3:h:ruckuswireless:r600:-:*:*:*:*:*:*:* |
ruckuswireless | r600_firmware | 10.5.1.0.199 | cpe:2.3:o:ruckuswireless:r600_firmware:10.5.1.0.199:*:*:*:*:*:*:* |
ruckuswireless | t300 | - | cpe:2.3:h:ruckuswireless:t300:-:*:*:*:*:*:*:* |
ruckuswireless | t300_firmware | 10.5.1.0.199 | cpe:2.3:o:ruckuswireless:t300_firmware:10.5.1.0.199:*:*:*:*:*:*:* |
ruckuswireless | t301n | - | cpe:2.3:h:ruckuswireless:t301n:-:*:*:*:*:*:*:* |
ruckuswireless | t301n_firmware | 10.5.1.0.199 | cpe:2.3:o:ruckuswireless:t301n_firmware:10.5.1.0.199:*:*:*:*:*:*:* |