Search criteria
ⓘ
Use this form to refine search results.
Full-text search supports keyword queries with ranking and filtering.
You can combine vendor, product, and sources to narrow results.
Enable “Apply ordering” to sort by date instead of relevance.
1 vulnerability found for scg-200 by ruckuswireless
VAR-201805-0638
Vulnerability from variot - Updated: 2025-01-30 20:17Ruckus SmartZone (formerly Virtual SmartCell Gateway or vSCG) 3.5.0, 3.5.1, 3.6.0, and 3.6.1 (Essentials and High Scale) on vSZ, SZ-100, SZ-300, and SCG-200 devices allows remote attackers to obtain sensitive information or modify data. Ruckus SmartZone Contains an information disclosure vulnerability.Information may be obtained and information may be altered. RuckusvSZ and others are wireless LAN controller products from Ruckus Wireless. SmartZone is one of the operating systems. There are security holes in SmartZone on several Ruckus products. The following products and versions are affected: Ruckus SmartZone Version 3.5.0, Version 3.5.1, Version 3.6.0, 3.6.1; vSZ; SZ-100; SZ-300; SCG-200
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201805-0638",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "sz-300",
"scope": "eq",
"trust": 1.6,
"vendor": "ruckuswireless",
"version": "3.5.0"
},
{
"model": "sz-300",
"scope": "eq",
"trust": 1.6,
"vendor": "ruckuswireless",
"version": "3.6.1"
},
{
"model": "sz-100",
"scope": "eq",
"trust": 1.6,
"vendor": "ruckuswireless",
"version": "3.6.0"
},
{
"model": "sz-100",
"scope": "eq",
"trust": 1.6,
"vendor": "ruckuswireless",
"version": "3.5.0"
},
{
"model": "sz-100",
"scope": "eq",
"trust": 1.6,
"vendor": "ruckuswireless",
"version": "3.6.1"
},
{
"model": "sz-100",
"scope": "eq",
"trust": 1.6,
"vendor": "ruckuswireless",
"version": "3.5.1"
},
{
"model": "sz-300",
"scope": "eq",
"trust": 1.6,
"vendor": "ruckuswireless",
"version": "3.6.0"
},
{
"model": "scg-200",
"scope": "eq",
"trust": 1.6,
"vendor": "ruckuswireless",
"version": "3.6.1"
},
{
"model": "sz-300",
"scope": "eq",
"trust": 1.6,
"vendor": "ruckuswireless",
"version": "3.5.1"
},
{
"model": "scg-200",
"scope": "eq",
"trust": 1.6,
"vendor": "ruckuswireless",
"version": "3.6.0"
},
{
"model": "vsz",
"scope": "eq",
"trust": 1.0,
"vendor": "ruckuswireless",
"version": "3.5.0"
},
{
"model": "vsz",
"scope": "eq",
"trust": 1.0,
"vendor": "ruckuswireless",
"version": "3.6.1"
},
{
"model": "vsz",
"scope": "eq",
"trust": 1.0,
"vendor": "ruckuswireless",
"version": "3.6.0"
},
{
"model": "scg-200",
"scope": "eq",
"trust": 1.0,
"vendor": "ruckuswireless",
"version": "3.5.0"
},
{
"model": "vsz",
"scope": "eq",
"trust": 1.0,
"vendor": "ruckuswireless",
"version": "3.5.1"
},
{
"model": "scg-200",
"scope": "eq",
"trust": 1.0,
"vendor": "ruckuswireless",
"version": "3.5.1"
},
{
"model": "scg-200",
"scope": "eq",
"trust": 0.8,
"vendor": "ruckus",
"version": "3.5.0"
},
{
"model": "scg-200",
"scope": "eq",
"trust": 0.8,
"vendor": "ruckus",
"version": "3.5.1"
},
{
"model": "scg-200",
"scope": "eq",
"trust": 0.8,
"vendor": "ruckus",
"version": "3.6.0"
},
{
"model": "scg-200",
"scope": "eq",
"trust": 0.8,
"vendor": "ruckus",
"version": "3.6.1"
},
{
"model": "sz-100",
"scope": "eq",
"trust": 0.8,
"vendor": "ruckus",
"version": "3.5.0"
},
{
"model": "sz-100",
"scope": "eq",
"trust": 0.8,
"vendor": "ruckus",
"version": "3.5.1"
},
{
"model": "sz-100",
"scope": "eq",
"trust": 0.8,
"vendor": "ruckus",
"version": "3.6.0"
},
{
"model": "sz-100",
"scope": "eq",
"trust": 0.8,
"vendor": "ruckus",
"version": "3.6.1"
},
{
"model": "sz-300",
"scope": "eq",
"trust": 0.8,
"vendor": "ruckus",
"version": "3.5.0"
},
{
"model": "sz-300",
"scope": "eq",
"trust": 0.8,
"vendor": "ruckus",
"version": "3.5.1"
},
{
"model": "sz-300",
"scope": "eq",
"trust": 0.8,
"vendor": "ruckus",
"version": "3.6.0"
},
{
"model": "sz-300",
"scope": "eq",
"trust": 0.8,
"vendor": "ruckus",
"version": "3.6.1"
},
{
"model": "vsz",
"scope": "eq",
"trust": 0.8,
"vendor": "ruckus",
"version": "3.5.0"
},
{
"model": "vsz",
"scope": "eq",
"trust": 0.8,
"vendor": "ruckus",
"version": "3.5.1"
},
{
"model": "vsz",
"scope": "eq",
"trust": 0.8,
"vendor": "ruckus",
"version": "3.6.0"
},
{
"model": "vsz",
"scope": "eq",
"trust": 0.8,
"vendor": "ruckus",
"version": "3.6.1"
},
{
"model": "wireless ruckus smartzone",
"scope": "eq",
"trust": 0.6,
"vendor": "ruckus",
"version": "3.5.0"
},
{
"model": "wireless ruckus smartzone",
"scope": "eq",
"trust": 0.6,
"vendor": "ruckus",
"version": "3.5.1"
},
{
"model": "wireless ruckus smartzone",
"scope": "eq",
"trust": 0.6,
"vendor": "ruckus",
"version": "3.6.0"
},
{
"model": "wireless ruckus smartzone",
"scope": "eq",
"trust": 0.6,
"vendor": "ruckus",
"version": "3.6.1"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2018-10905"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-006324"
},
{
"db": "CNNVD",
"id": "CNNVD-201805-1235"
},
{
"db": "NVD",
"id": "CVE-2018-11036"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/o:ruckus_wireless:scg-200_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:ruckus_wireless:sz-100_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:ruckus_wireless:sz-300_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:ruckus_wireless:vsz_firmware",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2018-006324"
}
]
},
"cve": "CVE-2018-11036",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CVE-2018-11036",
"impactScore": 4.9,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 1.8,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CNVD-2018-10905",
"impactScore": 4.9,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "VHN-120855",
"impactScore": 4.9,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:N",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 3.9,
"id": "CVE-2018-11036",
"impactScore": 5.2,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.8,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2018-11036",
"trust": 1.0,
"value": "CRITICAL"
},
{
"author": "NVD",
"id": "CVE-2018-11036",
"trust": 0.8,
"value": "Critical"
},
{
"author": "CNVD",
"id": "CNVD-2018-10905",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201805-1235",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-120855",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2018-10905"
},
{
"db": "VULHUB",
"id": "VHN-120855"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-006324"
},
{
"db": "CNNVD",
"id": "CNNVD-201805-1235"
},
{
"db": "NVD",
"id": "CVE-2018-11036"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Ruckus SmartZone (formerly Virtual SmartCell Gateway or vSCG) 3.5.0, 3.5.1, 3.6.0, and 3.6.1 (Essentials and High Scale) on vSZ, SZ-100, SZ-300, and SCG-200 devices allows remote attackers to obtain sensitive information or modify data. Ruckus SmartZone Contains an information disclosure vulnerability.Information may be obtained and information may be altered. RuckusvSZ and others are wireless LAN controller products from Ruckus Wireless. SmartZone is one of the operating systems. There are security holes in SmartZone on several Ruckus products. The following products and versions are affected: Ruckus SmartZone Version 3.5.0, Version 3.5.1, Version 3.6.0, 3.6.1; vSZ; SZ-100; SZ-300; SCG-200",
"sources": [
{
"db": "NVD",
"id": "CVE-2018-11036"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-006324"
},
{
"db": "CNVD",
"id": "CNVD-2018-10905"
},
{
"db": "VULHUB",
"id": "VHN-120855"
}
],
"trust": 2.25
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2018-11036",
"trust": 3.2
},
{
"db": "JVNDB",
"id": "JVNDB-2018-006324",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201805-1235",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2018-10905",
"trust": 0.6
},
{
"db": "OTHER",
"id": "NONE",
"trust": 0.1
},
{
"db": "VULHUB",
"id": "VHN-120855",
"trust": 0.1
}
],
"sources": [
{
"db": "OTHER",
"id": null
},
{
"db": "CNVD",
"id": "CNVD-2018-10905"
},
{
"db": "VULHUB",
"id": "VHN-120855"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-006324"
},
{
"db": "CNNVD",
"id": "CNNVD-201805-1235"
},
{
"db": "NVD",
"id": "CVE-2018-11036"
}
]
},
"id": "VAR-201805-0638",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "OTHER",
"id": null
},
{
"db": "CNVD",
"id": "CNVD-2018-10905"
},
{
"db": "VULHUB",
"id": "VHN-120855"
}
],
"trust": 1.8
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
},
{
"category": [
"network device"
],
"sub_category": "gateway",
"trust": 0.1
}
],
"sources": [
{
"db": "OTHER",
"id": null
},
{
"db": "CNVD",
"id": "CNVD-2018-10905"
}
]
},
"last_update_date": "2025-01-30T20:17:24.326000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Ruckus SmartZone Sensitive Information Disclosure Vulnerability",
"trust": 0.8,
"url": "https://www.ruckuswireless.com/security/279/view/txt"
},
{
"title": "Patch of multiple Ruckus products SmartZone information disclosure vulnerability",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/131197"
},
{
"title": "Multiple Ruckus product SmartZone Security vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=81246"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2018-10905"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-006324"
},
{
"db": "CNNVD",
"id": "CNNVD-201805-1235"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-200",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-120855"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-006324"
},
{
"db": "NVD",
"id": "CVE-2018-11036"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.3,
"url": "https://www.ruckuswireless.com/security/279/view/txt"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-11036"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-11036"
},
{
"trust": 0.1,
"url": "https://ieeexplore.ieee.org/abstract/document/10769424"
}
],
"sources": [
{
"db": "OTHER",
"id": null
},
{
"db": "CNVD",
"id": "CNVD-2018-10905"
},
{
"db": "VULHUB",
"id": "VHN-120855"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-006324"
},
{
"db": "CNNVD",
"id": "CNNVD-201805-1235"
},
{
"db": "NVD",
"id": "CVE-2018-11036"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "OTHER",
"id": null
},
{
"db": "CNVD",
"id": "CNVD-2018-10905"
},
{
"db": "VULHUB",
"id": "VHN-120855"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-006324"
},
{
"db": "CNNVD",
"id": "CNNVD-201805-1235"
},
{
"db": "NVD",
"id": "CVE-2018-11036"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2018-06-04T00:00:00",
"db": "CNVD",
"id": "CNVD-2018-10905"
},
{
"date": "2018-05-31T00:00:00",
"db": "VULHUB",
"id": "VHN-120855"
},
{
"date": "2018-08-16T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2018-006324"
},
{
"date": "2018-06-01T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201805-1235"
},
{
"date": "2018-05-31T12:29:00.220000",
"db": "NVD",
"id": "CVE-2018-11036"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2018-06-04T00:00:00",
"db": "CNVD",
"id": "CNVD-2018-10905"
},
{
"date": "2018-08-01T00:00:00",
"db": "VULHUB",
"id": "VHN-120855"
},
{
"date": "2018-08-16T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2018-006324"
},
{
"date": "2018-06-04T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201805-1235"
},
{
"date": "2024-11-21T03:42:32.317000",
"db": "NVD",
"id": "CVE-2018-11036"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201805-1235"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Ruckus SmartZone Vulnerable to information disclosure",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2018-006324"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "information disclosure",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201805-1235"
}
],
"trust": 0.6
}
}