{"api_version":"1","generated_at":"2026-04-23T07:55:56+00:00","cve":"CVE-2017-6223","urls":{"html":"https://cve.report/CVE-2017-6223","api":"https://cve.report/api/cve/CVE-2017-6223.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2017-6223","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2017-6223"},"summary":{"title":"CVE-2017-6223","description":"Ruckus Wireless Zone Director Controller firmware releases ZD9.9.x, ZD9.10.x, ZD9.13.0.x less than 9.13.0.0.232 contain OS Command Injection vulnerabilities in the ping functionality that could allow local authenticated users to execute arbitrary privileged commands on the underlying operating system.","state":"PUBLIC","assigner":"sirt@brocade.com","published_at":"2017-10-13 17:29:00","updated_at":"2017-10-27 14:39:00"},"problem_types":["CWE-78"],"metrics":[],"references":[{"url":"https://ruckus-www.s3.amazonaws.com/pdf/security/faq-security-advisory-id-092917.txt","name":"https://ruckus-www.s3.amazonaws.com/pdf/security/faq-security-advisory-id-092917.txt","refsource":"CONFIRM","tags":["Vendor Advisory"],"title":"","mime":"text/xml","httpstatus":"403","archivestatus":"403"},{"url":"https://www.cve.org/CVERecord?id=CVE-2017-6223","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-6223","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2017","cve_id":"6223","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"ruckus","cpe5":"zonedirector","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"6223","vulnerable":"0","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"ruckus","cpe5":"zonedirector","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"6223","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"ruckus","cpe5":"zonedirector_firmware","cpe6":"zd9.10.0.0.218","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"6223","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"ruckus","cpe5":"zonedirector_firmware","cpe6":"zd9.13.0.0.103","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"6223","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"ruckus","cpe5":"zonedirector_firmware","cpe6":"zd9.13.0.0.209","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"6223","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"ruckus","cpe5":"zonedirector_firmware","cpe6":"zd9.9.0.0.205","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"6223","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"ruckus","cpe5":"zonedirector_firmware","cpe6":"zd9.9.0.0.212","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"6223","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"ruckus","cpe5":"zonedirector_firmware","cpe6":"zd9.9.0.0.216","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"6223","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"ruckus","cpe5":"zonedirector_firmware","cpe6":"zd9.10.0.0.218","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"6223","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"ruckus","cpe5":"zonedirector_firmware","cpe6":"zd9.13.0.0.103","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"6223","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"ruckus","cpe5":"zonedirector_firmware","cpe6":"zd9.13.0.0.209","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"6223","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"ruckus","cpe5":"zonedirector_firmware","cpe6":"zd9.9.0.0.205","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"6223","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"ruckus","cpe5":"zonedirector_firmware","cpe6":"zd9.9.0.0.212","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"6223","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"ruckus","cpe5":"zonedirector_firmware","cpe6":"zd9.9.0.0.216","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"sirt@brocade.com","DATE_PUBLIC":"2017-09-27T00:00:00","ID":"CVE-2017-6223","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Zone Director Controller Firmware","version":{"version_data":[{"version_value":"ZD9.9.x"},{"version_value":"ZD9.10.x"},{"version_value":"ZD9.13.0.x"}]}}]},"vendor_name":"Brocade Communications Systems, Inc."}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Ruckus Wireless Zone Director Controller firmware releases ZD9.9.x, ZD9.10.x, ZD9.13.0.x less than 9.13.0.0.232 contain OS Command Injection vulnerabilities in the ping functionality that could allow local authenticated users to execute arbitrary privileged commands on the underlying operating system."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Authenticated Root Command Injection"}]}]},"references":{"reference_data":[{"name":"https://ruckus-www.s3.amazonaws.com/pdf/security/faq-security-advisory-id-092917.txt","refsource":"CONFIRM","url":"https://ruckus-www.s3.amazonaws.com/pdf/security/faq-security-advisory-id-092917.txt"}]}},"nvd":{"publishedDate":"2017-10-13 17:29:00","lastModifiedDate":"2017-10-27 14:39:00","problem_types":["CWE-78"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:C/I:C/A:C","accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE","baseScore":9.3},"severity":"HIGH","exploitabilityScore":8.6,"impactScore":10,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"AND","children":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:ruckus:zonedirector_firmware:zd9.9.0.0.205:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:ruckus:zonedirector_firmware:zd9.9.0.0.212:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:ruckus:zonedirector_firmware:zd9.9.0.0.216:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:ruckus:zonedirector_firmware:zd9.10.0.0.218:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:ruckus:zonedirector_firmware:zd9.13.0.0.103:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:ruckus:zonedirector_firmware:zd9.13.0.0.209:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:ruckus:zonedirector:-:*:*:*:*:*:*:*","cpe_name":[]}]}],"cpe_match":[]}]}},"legacy_mitre":{"record":{"CveYear":"2017","CveId":"6223","Ordinal":"102852","Title":"CVE-2017-6223","CVE":"CVE-2017-6223","Year":"2017"},"notes":[{"CveYear":"2017","CveId":"6223","Ordinal":"1","NoteData":"Ruckus Wireless Zone Director Controller firmware releases ZD9.9.x, ZD9.10.x, ZD9.13.0.x less than 9.13.0.0.232 contain OS Command Injection vulnerabilities in the ping functionality that could allow local authenticated users to execute arbitrary privileged commands on the underlying operating system.","Type":"Description","Title":null},{"CveYear":"2017","CveId":"6223","Ordinal":"2","NoteData":"2017-10-13","Type":"Other","Title":"Published"},{"CveYear":"2017","CveId":"6223","Ordinal":"3","NoteData":"2017-10-13","Type":"Other","Title":"Modified"}]}}}