First published: Wed Oct 16 2013(Updated: )
Ruckus Wireless Zoneflex 2942 devices with firmware 9.6.0.0.267 allow remote attackers to bypass authentication, and subsequently access certain configuration/ and maintenance/ scripts, by constructing a crafted URI after receiving an authentication error for an arbitrary login attempt.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ruckus Wireless ZoneFlex 2942 Firmware | =9.6.0.0.267 | |
Ruckus Wireless ZoneFlex 2942 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-5030 has a high severity rating, as it allows remote attackers to bypass authentication and access sensitive configuration scripts.
To fix CVE-2013-5030, upgrade Ruckus Wireless Zoneflex 2942 devices to a firmware version that is not affected by this vulnerability.
CVE-2013-5030 enables remote attackers to exploit authentication flaws to access restricted configuration and maintenance scripts.
CVE-2013-5030 affects Ruckus Wireless Zoneflex 2942 devices running firmware version 9.6.0.0.267.
Preventive measures for CVE-2013-5030 include securing device configurations and ensuring firmware is regularly updated to the latest version.