CVE-2017-6229
Summary
| CVE | CVE-2017-6229 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2018-02-14 19:29:00 UTC |
| Updated | 2018-03-12 18:19:00 UTC |
| Description | Ruckus Networks Unleashed AP firmware releases before 200.6.10.1.x and Ruckus Networks Zone Director firmware releases 10.1.0.0.x, 9.10.2.0.x, 9.12.3.0.x, 9.13.3.0.x, 10.0.1.0.x or before contain authenticated Root Command Injection in the CLI that could allow authenticated valid users to execute privileged commands on the respective systems. |
Risk And Classification
Problem Types: CWE-78
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Hardware | Ruckuswireless | H320 | - | All | All | All |
| Hardware | Ruckuswireless | H320 | - | All | All | All |
| Operating System | Ruckuswireless | H320 Firmware | All | All | All | All |
| Operating System | Ruckuswireless | H320 Firmware | All | All | All | All |
| Hardware | Ruckuswireless | H510 | - | All | All | All |
| Hardware | Ruckuswireless | H510 | - | All | All | All |
| Operating System | Ruckuswireless | H510 Firmware | All | All | All | All |
| Operating System | Ruckuswireless | H510 Firmware | All | All | All | All |
| Hardware | Ruckuswireless | R310 | - | All | All | All |
| Hardware | Ruckuswireless | R310 | - | All | All | All |
| Operating System | Ruckuswireless | R310 Firmware | All | All | All | All |
| Operating System | Ruckuswireless | R310 Firmware | All | All | All | All |
| Hardware | Ruckuswireless | R500 | - | All | All | All |
| Hardware | Ruckuswireless | R500 | - | All | All | All |
| Operating System | Ruckuswireless | R500 Firmware | All | All | All | All |
| Operating System | Ruckuswireless | R500 Firmware | All | All | All | All |
| Hardware | Ruckuswireless | R510 | - | All | All | All |
| Hardware | Ruckuswireless | R510 | - | All | All | All |
| Operating System | Ruckuswireless | R510 Firmware | All | All | All | All |
| Operating System | Ruckuswireless | R510 Firmware | All | All | All | All |
| Hardware | Ruckuswireless | R600 | - | All | All | All |
| Hardware | Ruckuswireless | R600 | - | All | All | All |
| Operating System | Ruckuswireless | R600 Firmware | All | All | All | All |
| Operating System | Ruckuswireless | R600 Firmware | All | All | All | All |
| Hardware | Ruckuswireless | R710 | - | All | All | All |
| Hardware | Ruckuswireless | R710 | - | All | All | All |
| Operating System | Ruckuswireless | R710 Firmware | All | All | All | All |
| Operating System | Ruckuswireless | R710 Firmware | All | All | All | All |
| Hardware | Ruckuswireless | R720 | - | All | All | All |
| Hardware | Ruckuswireless | R720 | - | All | All | All |
| Operating System | Ruckuswireless | R720 Firmware | All | All | All | All |
| Operating System | Ruckuswireless | R720 Firmware | All | All | All | All |
| Hardware | Ruckuswireless | T300 | - | All | All | All |
| Hardware | Ruckuswireless | T300 | - | All | All | All |
| Hardware | Ruckuswireless | T300e | - | All | All | All |
| Hardware | Ruckuswireless | T300e | - | All | All | All |
| Operating System | Ruckuswireless | T300e Firmware | All | All | All | All |
| Operating System | Ruckuswireless | T300e Firmware | All | All | All | All |
| Operating System | Ruckuswireless | T300 Firmware | All | All | All | All |
| Operating System | Ruckuswireless | T300 Firmware | All | All | All | All |
| Hardware | Ruckuswireless | T301 | - | All | All | All |
| Hardware | Ruckuswireless | T301 | - | All | All | All |
| Operating System | Ruckuswireless | T301 Firmware | All | All | All | All |
| Operating System | Ruckuswireless | T301 Firmware | All | All | All | All |
| Hardware | Ruckuswireless | T610 | - | All | All | All |
| Hardware | Ruckuswireless | T610 | - | All | All | All |
| Operating System | Ruckuswireless | T610 Firmware | All | All | All | All |
| Operating System | Ruckuswireless | T610 Firmware | All | All | All | All |
| Operating System | Ruckuswireless | T710 | - | All | All | All |
| Operating System | Ruckuswireless | T710 | - | All | All | All |
| Operating System | Ruckuswireless | T710 Firmware | All | All | All | All |
| Operating System | Ruckuswireless | T710 Firmware | All | All | All | All |
| Hardware | Ruckuswireless | Zonedirector 1200 | - | All | All | All |
| Hardware | Ruckuswireless | Zonedirector 1200 | - | All | All | All |
| Operating System | Ruckuswireless | Zonedirector 1200 Firmware | 10.1.0.0.1515 | All | All | All |
| Operating System | Ruckuswireless | Zonedirector 1200 Firmware | 10.1.0.0.1515 | All | All | All |
| Operating System | Ruckuswireless | Zonedirector 1200 Firmware | All | All | All | All |
| Operating System | Ruckuswireless | Zonedirector 1200 Firmware | All | All | All | All |
| Operating System | Ruckuswireless | Zonedirector 1200 Firmware | All | All | All | All |
| Operating System | Ruckuswireless | Zonedirector 1200 Firmware | All | All | All | All |
| Hardware | Ruckuswireless | Zonedirector 3000 | - | All | All | All |
| Hardware | Ruckuswireless | Zonedirector 3000 | - | All | All | All |
| Operating System | Ruckuswireless | Zonedirector 3000 Firmware | 10.1.0.0.1515 | All | All | All |
| Operating System | Ruckuswireless | Zonedirector 3000 Firmware | 10.1.0.0.1515 | All | All | All |
| Operating System | Ruckuswireless | Zonedirector 3000 Firmware | All | All | All | All |
| Operating System | Ruckuswireless | Zonedirector 3000 Firmware | All | All | All | All |
| Operating System | Ruckuswireless | Zonedirector 3000 Firmware | All | All | All | All |
| Operating System | Ruckuswireless | Zonedirector 3000 Firmware | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| ruckus-www.s3.amazonaws.com/pdf/security/faq-security-advisory-id-20180202-v1.0.txt | CONFIRM | ruckus-www.s3.amazonaws.com | Vendor Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.