First published: Thu Dec 07 2023(Updated: )
A cross-site-scripting vulnerability exists in Ruckus Access Point products (ZoneDirector, SmartZone, and AP Solo). If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who is logging in the product. As for the affected products/models/versions, see the information provided by the vendor listed under [References] section or the list under [Product Status] section.
Credit: vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Ruckus Wireless R750 Firmware | <=114.0.0.0.6565 | |
Ruckus Wireless R750 | ||
All of | ||
Ruckus Wireless R650 Firmware | <=114.0.0.0.6565 | |
Ruckus Wireless R650 | ||
All of | ||
Ruckus Wireless R730 Firmware | <=114.0.0.0.6565 | |
Ruckus Wireless R730 | ||
All of | ||
Ruckus Wireless T750 Firmware | <=114.0.0.0.6565 | |
Ruckus Wireless T750 | ||
All of | ||
Ruckus Wireless R510 Firmware | <=114.0.0.0.6565 | |
Ruckus Wireless R510 | ||
All of | ||
Ruckus Wireless E510 Firmware | <=114.0.0.0.6565 | |
Ruckus Wireless E510 | ||
All of | ||
Ruckus Wireless C110 Firmware | <=114.0.0.0.6565 | |
Ruckus Wireless C110 | ||
All of | ||
Ruckus Wireless R320 Firmware | <=114.0.0.0.6565 | |
Ruckus Wireless R320 | ||
All of | ||
Ruckus Wireless H510 Firmware | <=114.0.0.0.6565 | |
Ruckus Wireless H510 | ||
All of | ||
Ruckus Wireless H320 Firmware | <=114.0.0.0.6565 | |
Ruckus Wireless H320 | ||
All of | ||
Ruckus Wireless T305 Firmware | <=114.0.0.0.6565 | |
Ruckus Wireless T305 Firmware | ||
All of | ||
Ruckus Wireless M510 Firmware | <=114.0.0.0.6565 | |
Ruckus Wireless M510 | ||
All of | ||
Ruckus Wireless R720 Firmware | <=114.0.0.0.6565 | |
Ruckus Wireless R720 | ||
All of | ||
Ruckus Wireless R710 Firmware | <=114.0.0.0.6565 | |
Ruckus Wireless R710 | ||
All of | ||
Ruckus Wireless T710 Firmware | <=114.0.0.0.6565 | |
Ruckus Wireless T710 | ||
All of | ||
Ruckus Wireless T610 Firmware | <=114.0.0.0.6565 | |
Ruckus Wireless T610 | ||
All of | ||
Ruckus Wireless R610 Firmware | <=114.0.0.0.6565 | |
Ruckus Wireless R610 | ||
All of | ||
Ruckus Wireless T310D Firmware | <=114.0.0.0.6565 | |
Ruckus Wireless T310d | ||
All of | ||
Ruckus Wireless T310S Firmware | <=114.0.0.0.6565 | |
Ruckus Wireless T310s | ||
All of | ||
Ruckus Wireless T310n Firmware | <=114.0.0.0.6565 | |
Ruckus Wireless T310n | ||
All of | ||
Ruckus Wireless T310C Firmware | <=114.0.0.0.6565 | |
Ruckus Wireless T310c | ||
All of | ||
Ruckus Wireless T710S Firmware | <=114.0.0.0.6565 | |
Ruckus Wireless T710S | ||
All of | ||
Ruckus Wireless T610S Firmware | <=114.0.0.0.6565 | |
Ruckus Wireless T610 | ||
All of | ||
Ruckus Wireless R550 Firmware | <=114.0.0.0.5585 | |
Ruckus Wireless R550 | ||
All of | ||
Ruckus Wireless R850 Firmware | <=114.0.0.0.5585 | |
Ruckus Wireless R850 | ||
All of | ||
Ruckus Wireless T750SE Firmware | <=114.0.0.0.5585 | |
Ruckus Wireless T750SE | ||
All of | ||
Ruckus Wireless R310 Firmware | <=110.0.0.0.2014 | |
Ruckus Wireless R310 | ||
All of | ||
Ruckus Wireless R760 Firmware | <=118.1.0.0.1274 | |
Ruckus Wireless R760 | ||
All of | ||
Ruckus Wireless R560 Firmware | <=118.1.0.0.1908 | |
Ruckus Wireless R560 | ||
All of | ||
Ruckus Wireless H550 Firmware | <=116.0.0.0.1506 | |
Ruckus Wireless H550 | ||
All of | ||
Ruckus Wireless H350 Firmware | <=116.0.0.0.3128 | |
Ruckus Wireless H350 | ||
All of | ||
Ruckus Wireless T350C Firmware | <=116.0.0.0.1543 | |
Ruckus Wireless T350C | ||
All of | ||
Ruckus Wireless T350D Firmware | <=116.0.0.0.1543 | |
Ruckus Wireless T350D | ||
All of | ||
Ruckus Wireless T350SE Firmware | <=116.0.0.0.3136 | |
Ruckus Wireless T350SE | ||
All of | ||
Ruckus Wireless R350 Firmware | <=116.0.0.0.1655 | |
Ruckus Wireless R350 | ||
All of | ||
Ruckus Wireless SmartZone Firmware | <=6.1.1 | |
Ruckus Wireless SmartZone | ||
All of | ||
Ruckus Wireless ZoneDirector Firmware | <=10.5.1 | |
Ruckus Zonedirector |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-49225 is classified as a Cross-Site Scripting (XSS) vulnerability with a potential high severity due to the ability to execute arbitrary scripts in the user's web browser.
To remediate CVE-2023-49225, users should upgrade their Ruckus Access Point firmware to versions beyond 114.0.0.0.6565 for affected models.
CVE-2023-49225 affects various Ruckus Access Point products including R750, R650, R730, T750, and more, specifically those running certain firmware versions.
You can determine if your Ruckus device is vulnerable by checking its current firmware version against the specifications of CVE-2023-49225.
If exploited, CVE-2023-49225 could allow an attacker to inject and execute arbitrary scripts in the context of a logged-in user's web session, compromising user security.