2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2020-13917" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2020-07-28T15:15:11.737" ,
2024-11-23 13:10:58 +00:00
"lastModified" : "2024-11-21T05:02:08.647" ,
"vulnStatus" : "Modified" ,
2024-12-08 03:06:42 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "rkscli in Ruckus Wireless Unleashed through 200.7.10.92 allows a remote attacker to achieve command injection and jailbreak the CLI via a crafted CLI command. This affects C110, E510, H320, H510, M510, R320, R310, R500, R510 R600, R610, R710, R720, R750, T300, T301n, T301s, T310c, T310d, T310n, T310s, T610, T710, and T710s devices."
} ,
{
"lang" : "es" ,
"value" : "rkscli en Ruckus Wireless Unleashed versiones hasta 200.7.10.92, permite a un atacante remoto lograr una inyecci\u00f3n de comandos y un jailbreak de la CLI por medio de un comando de la CLI dise\u00f1ado. Esto afecta a los dispositivos C110, E510, H320, H510, M510, R320, R310, R500, R510 R600, R610, R710, R720, R750, T300, T301n, T301s, T310c, T310d, T310n, T310s, T610, y T710"
}
] ,
"metrics" : {
"cvssMetricV31" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" ,
2024-11-23 13:10:58 +00:00
"baseScore" : 9.8 ,
"baseSeverity" : "CRITICAL" ,
2023-04-24 12:24:31 +02:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
2024-11-23 13:10:58 +00:00
"availabilityImpact" : "HIGH"
2023-04-24 12:24:31 +02:00
} ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 5.9
}
] ,
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:L/Au:N/C:P/I:P/A:P" ,
2024-11-23 13:10:58 +00:00
"baseScore" : 7.5 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "NETWORK" ,
"accessComplexity" : "LOW" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "PARTIAL" ,
"integrityImpact" : "PARTIAL" ,
2024-11-23 13:10:58 +00:00
"availabilityImpact" : "PARTIAL"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "HIGH" ,
"exploitabilityScore" : 10.0 ,
"impactScore" : 6.4 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-77"
}
]
}
] ,
"configurations" : [
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:ruckuswireless:unleashed_firmware:*:*:*:*:*:*:*:*" ,
"versionEndIncluding" : "200.7.10.102.92" ,
"matchCriteriaId" : "C3C6FE6A-B160-4C64-B900-9F5637EE2EF4"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:ruckuswireless:c110:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A77671DB-6197-4C8D-B667-A0081350E5AF"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:ruckuswireless:e510:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "FBF5C92C-C889-4732-BB00-E6D55613E410"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:ruckuswireless:h320:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "282C3A1D-711C-4415-B9BE-A9B518204AEB"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:ruckuswireless:h510:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "CB1FAB48-786A-4FB3-AB6D-3118E94E68C7"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:ruckuswireless:m510:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D4AE7200-4090-4B81-A22F-B8553A014D21"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:ruckuswireless:r310:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "40D3129E-4C02-484F-96B6-59D76F787D21"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:ruckuswireless:r320:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "93CE3224-85D2-4039-8F24-BB503DFD42C2"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:ruckuswireless:r500:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9BBDBE9C-BE4B-4ED6-AF62-8FE484C519E2"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:ruckuswireless:r510:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "80B2E8CC-EACE-4A80-9EB1-DADAB8034415"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:ruckuswireless:r600:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5421B1D7-E630-4BDA-BA34-7DD8D0738DF4"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:ruckuswireless:r610:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "4244947C-538E-4B83-B4F4-3DD4F3C22E83"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:ruckuswireless:r710:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E95884E9-C6AF-4106-A178-9274AD27EF65"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:ruckuswireless:r720:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "DDFDAF0A-9F5D-4E34-805E-6F27103AAA32"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:ruckuswireless:r750:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "BA49CB45-1196-4AD7-8AB6-C5593BBF015F"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:ruckuswireless:t300:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0511674E-59A6-427C-A265-B277D84DE301"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:ruckuswireless:t301n:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "EBB7A43E-F5F1-465A-841F-05214EDA6833"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:ruckuswireless:t301s:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "68C4D9AC-5B1C-4066-8216-3F7127C3CC64"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:ruckuswireless:t310c:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "BFB69C4E-2B4F-4F61-8A65-9BA0354F33E3"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:ruckuswireless:t310d:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C2D3E8C6-4676-4B74-A252-132A26670C64"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:ruckuswireless:t310n:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2ED4C9B4-7F70-4059-8592-FD3F034160C3"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:ruckuswireless:t310s:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "72378D4B-ADB5-4DE5-BB92-1778BDFD61FC"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:ruckuswireless:t610:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "210D55AB-9305-4D0B-B9F0-47889D37373B"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:ruckuswireless:t710:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A40B9489-D999-4355-953E-36A7F8DEF299"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:ruckuswireless:t710s:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "4CFF0772-D853-4781-B326-E3BDEAC78EE0"
}
]
}
]
}
] ,
"references" : [
{
"url" : "https://support.ruckuswireless.com/security_bulletins/304" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
2024-11-23 13:10:58 +00:00
} ,
{
"url" : "https://support.ruckuswireless.com/security_bulletins/304" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
2023-04-24 12:24:31 +02:00
}
]
}