First published: Tue Jul 28 2020(Updated: )
webs in Ruckus Wireless Unleashed through 200.7.10.102.92 allows a remote attacker to cause a denial of service (Segmentation fault) to the webserver via an unauthenticated crafted HTTP request. This affects C110, E510, H320, H510, M510, R320, R310, R500, R510 R600, R610, R710, R720, R750, T300, T301n, T301s, T310c, T310d, T310n, T310s, T610, T710, and T710s devices.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ruckuswireless Unleashed firmware | <=200.7.10.102.92 | |
Ruckus Wireless C110 | ||
Ruckus Wireless E510 | ||
Ruckus Wireless H320 | ||
Ruckus Wireless H510 | ||
Ruckus Wireless M510 | ||
Ruckus Wireless R310 | ||
Ruckus Wireless R320 | ||
Arris Ruckus Zoneflex R500 | ||
Ruckus Wireless R510 | ||
Ruckus Wireless R600 | ||
Ruckus Wireless R610 | ||
Ruckus Wireless R710 | ||
Ruckus Wireless R720 | ||
Ruckus Wireless R750 | ||
Ruckus Wireless T300 | ||
Ruckus Wireless T301n | ||
Ruckus Wireless T301s | ||
Ruckus Wireless T310c | ||
Ruckus Wireless T310d | ||
Ruckus Wireless T310n | ||
Ruckus Wireless T310s | ||
Ruckus Wireless T610 | ||
Ruckus Wireless T710 | ||
Ruckus Wireless T710S |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-13914 is categorized as high due to its potential to cause a denial of service.
To fix CVE-2020-13914, you should upgrade your Ruckus Wireless Unleashed firmware to a version higher than 200.7.10.102.92.
CVE-2020-13914 affects various Ruckus Wireless models when running the vulnerable firmware version.
Yes, CVE-2020-13914 can be exploited remotely by sending a crafted HTTP request to the webserver.
No, CVE-2020-13914 can be exploited without authentication.