First published: Fri Jan 20 2023(Updated: )
In Ruckus R310 10.5.1.0.199, Ruckus R500 10.5.1.0.199, Ruckus R600 10.5.1.0.199, Ruckus T300 10.5.1.0.199, Ruckus T301n 10.5.1.0.199, Ruckus T301s 10.5.1.0.199, SmartCell Gateway 200 (SCG200) before 3.6.2.0.795, SmartZone 100 (SZ-100) before 3.6.2.0.795, SmartZone 300 (SZ300) before 3.6.2.0.795, Virtual SmartZone (vSZ) before 3.6.2.0.795, ZoneDirector 1100 9.10.2.0.130, ZoneDirector 1200 10.2.1.0.218, ZoneDirector 3000 10.2.1.0.218, ZoneDirector 5000 10.0.1.0.151, a vulnerability allows attackers to force bypass Secure Boot failed attempts and run temporarily the previous Backup image.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Ruckus Wireless R310 Firmware | =10.5.1.0.199 | |
Ruckus Wireless R310 | ||
All of | ||
Arris Ruckus Zoneflex R500 Firmware | =10.5.1.0.199 | |
Arris Ruckus Zoneflex R500 | ||
All of | ||
Ruckus Wireless R600 Firmware | =10.5.1.0.199 | |
Ruckus Wireless R600 | ||
All of | ||
Ruckus Wireless T300 Firmware | =10.5.1.0.199 | |
Ruckus Wireless T300 | ||
All of | ||
Ruckus Wireless T301n Firmware | =10.5.1.0.199 | |
Ruckus Wireless T301n | ||
All of | ||
Ruckus Wireless T301s Firmware | =10.5.1.0.199 | |
Ruckus Wireless T301s | ||
All of | ||
Ruckus Wireless SCG200 Firmware | <3.6.2.0.795 | |
Ruckus Wireless SCG200 | ||
All of | ||
Ruckus Wireless SZ-100 Firmware | <3.6.2.0.795 | |
Ruckus Wireless SZ-100 Firmware | ||
All of | ||
Ruckus Wireless SZ-300 Firmware | <3.6.2.0.795 | |
Ruckus Wireless SZ-300 Firmware | ||
All of | ||
Ruckus Wireless VSZ | <3.6.2.0.795 | |
Ruckus Wireless VSZ | ||
All of | ||
Ruckus Wireless ZoneDirector 1100 firmware | =9.10.2.0.130 | |
Ruckus Wireless ZoneDirector 1100 | ||
All of | ||
Ruckus Wireless ZoneDirector 1200 Firmware | =10.2.1.0.218 | |
Ruckus Wireless ZoneDirector 1200 | ||
All of | ||
Ruckus Wireless ZoneDirector 3000 | =10.2.1.0.218 | |
Ruckus Wireless ZoneDirector 3000 | ||
All of | ||
Ruckus Wireless ZoneDirector 5000 | =10.0.1.0.151 | |
Ruckus Wireless ZoneDirector 5000 | ||
Ruckus Wireless R310 Firmware | =10.5.1.0.199 | |
Ruckus Wireless R310 | ||
Arris Ruckus Zoneflex R500 Firmware | =10.5.1.0.199 | |
Arris Ruckus Zoneflex R500 | ||
Ruckus Wireless R600 Firmware | =10.5.1.0.199 | |
Ruckus Wireless R600 | ||
Ruckus Wireless T300 Firmware | =10.5.1.0.199 | |
Ruckus Wireless T300 | ||
Ruckus Wireless T301n Firmware | =10.5.1.0.199 | |
Ruckus Wireless T301n | ||
Ruckus Wireless T301s Firmware | =10.5.1.0.199 | |
Ruckus Wireless T301s | ||
Ruckus Wireless SCG200 Firmware | <3.6.2.0.795 | |
Ruckus Wireless SCG200 | ||
Ruckus Wireless SZ-100 Firmware | <3.6.2.0.795 | |
Ruckus Wireless SZ-100 Firmware | ||
Ruckus Wireless SZ-300 Firmware | <3.6.2.0.795 | |
Ruckus Wireless SZ-300 Firmware | ||
Ruckus Wireless VSZ | <3.6.2.0.795 | |
Ruckus Wireless VSZ | ||
Ruckus Wireless ZoneDirector 1100 firmware | =9.10.2.0.130 | |
Ruckus Wireless ZoneDirector 1100 | ||
Ruckus Wireless ZoneDirector 1200 Firmware | =10.2.1.0.218 | |
Ruckus Wireless ZoneDirector 1200 | ||
Ruckus Wireless ZoneDirector 3000 | =10.2.1.0.218 | |
Ruckus Wireless ZoneDirector 3000 | ||
Ruckus Wireless ZoneDirector 5000 | =10.0.1.0.151 | |
Ruckus Wireless ZoneDirector 5000 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-22660 is rated as a medium severity vulnerability due to its potential to allow unauthorized access to affected Ruckus devices.
To fix CVE-2020-22660, upgrade the affected Ruckus firmware to a version that includes the security patches addressing this vulnerability.
The affected products include R310, R500, R600, T300, T301n, T301s, SCG200, SZ-100, and SZ-300 with specific firmware versions.
No official workarounds have been provided for CVE-2020-22660, so upgrading the firmware is recommended.
CVE-2020-22660 could potentially allow an attacker to gain unauthorized access and compromise the affected devices' security.