Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2019-19843


Incorrect access control in the web interface in Ruckus Wireless Unleashed through 200.7.10.102.64 allows remote credential fetch via an unauthenticated HTTP request involving a symlink with /tmp and web/user/wps_tool_cache.


Published

2020-01-22T19:15:12.517

Last Modified

2024-11-21T04:35:30.683

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 9.8 (CRITICAL)

CVSSv2 Vector

AV:N/AC:L/Au:N/C:P/I:P/A:P

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: PARTIAL
  • Availability Impact: PARTIAL
Exploitability Score

10.0

Impact Score

6.4

Weaknesses
  • Type: Primary
    CWE-522
    CWE-552

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System ruckuswireless unleashed < 200.7.10.202.94 Yes
Hardware ruckuswireless c110 - No
Hardware ruckuswireless e510 - No
Hardware ruckuswireless h320 - No
Hardware ruckuswireless h510 - No
Hardware ruckuswireless m510 - No
Hardware ruckuswireless r310 - No
Hardware ruckuswireless r320 - No
Hardware ruckuswireless r510 - No
Hardware ruckuswireless r610 - No
Hardware ruckuswireless r710 - No
Hardware ruckuswireless r720 - No
Hardware ruckuswireless t310 - No
Hardware ruckuswireless t610 - No
Hardware ruckuswireless t710 - No
Operating System ruckuswireless zonedirector_1200_firmware < 9.10.2.0.84 Yes
Operating System ruckuswireless zonedirector_1200_firmware < 9.12.3.0.136 Yes
Operating System ruckuswireless zonedirector_1200_firmware < 10.0.1.0.90 Yes
Operating System ruckuswireless zonedirector_1200_firmware < 10.1.2.0.275 Yes
Operating System ruckuswireless zonedirector_1200_firmware < 10.2.1.0.147 Yes
Operating System ruckuswireless zonedirector_1200_firmware < 10.3.1.0.21 Yes
Hardware ruckuswireless zonedirector_1200 - No

References