First published: Wed Feb 14 2018(Updated: )
Ruckus Networks Solo APs firmware releases R110.x or before and Ruckus Networks SZ managed APs firmware releases R5.x or before contain authenticated Root Command Injection in the web-GUI that could allow authenticated valid users to execute privileged commands on the respective systems.
Credit: sirt@brocade.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ruckus Wireless Solo Access Point Firmware | <=r110.0 | |
Ruckus Wireless SmartZone Managed Access Point Firmware | <=r5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-6230 is classified as a critical vulnerability due to the potential for authenticated users to execute arbitrary privileged commands.
To mitigate CVE-2017-6230, upgrade to firmware versions after R110.x for Solo APs and R5.x for SZ managed APs.
CVE-2017-6230 affects users of Ruckus Networks Solo Access Points running firmware R110.x or earlier and Smartzone Managed Access Points with firmware R5.x or earlier.
CVE-2017-6230 is an authenticated command injection vulnerability found in the web-GUI of affected Ruckus Networks devices.
CVE-2017-6230 can be exploited by authenticated users on the local network, necessitating valid credentials for exploitation.