Search criteria
3 vulnerabilities found for vsz by ruckuswireless
VAR-202301-1662
Vulnerability from variot - Updated: 2025-04-04 23:31In Ruckus R310 10.5.1.0.199, Ruckus R500 10.5.1.0.199, Ruckus R600 10.5.1.0.199, Ruckus T300 10.5.1.0.199, Ruckus T301n 10.5.1.0.199, Ruckus T301s 10.5.1.0.199, SmartCell Gateway 200 (SCG200) before 3.6.2.0.795, SmartZone 100 (SZ-100) before 3.6.2.0.795, SmartZone 300 (SZ300) before 3.6.2.0.795, Virtual SmartZone (vSZ) before 3.6.2.0.795, ZoneDirector 1100 9.10.2.0.130, ZoneDirector 1200 10.2.1.0.218, ZoneDirector 3000 10.2.1.0.218, ZoneDirector 5000 10.0.1.0.151, a vulnerability allows attackers to change and set unauthorized "illegal region code" by remote code Execution command injection which leads to run illegal frequency with maxi output power. Vulnerability allows attacker to create an arbitrary amount of ssid wlans interface per radio which creates overhead over noise (the default max limit is 8 ssid only per radio in solo AP). Vulnerability allows attacker to unlock hidden regions by privilege command injection in WEB GUI. plural Ruckus Networks ( Old Ruckus Wireless, Inc.) Contains a command injection vulnerability.Information may be tampered with
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202301-1662",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "zonedirector 1100",
"scope": "eq",
"trust": 1.0,
"vendor": "ruckuswireless",
"version": "9.10.2.0.130"
},
{
"model": "t301s",
"scope": "eq",
"trust": 1.0,
"vendor": "ruckuswireless",
"version": "10.5.1.0.199"
},
{
"model": "r500",
"scope": "eq",
"trust": 1.0,
"vendor": "ruckuswireless",
"version": "10.5.1.0.199"
},
{
"model": "r310",
"scope": "eq",
"trust": 1.0,
"vendor": "ruckuswireless",
"version": "10.5.1.0.199"
},
{
"model": "r600",
"scope": "eq",
"trust": 1.0,
"vendor": "ruckuswireless",
"version": "10.5.1.0.199"
},
{
"model": "t301n",
"scope": "eq",
"trust": 1.0,
"vendor": "ruckuswireless",
"version": "10.5.1.0.199"
},
{
"model": "zonedirector 3000",
"scope": "eq",
"trust": 1.0,
"vendor": "ruckuswireless",
"version": "10.2.1.0.218"
},
{
"model": "sz-100",
"scope": "lt",
"trust": 1.0,
"vendor": "ruckuswireless",
"version": "3.6.2.0.795"
},
{
"model": "t300",
"scope": "eq",
"trust": 1.0,
"vendor": "ruckuswireless",
"version": "10.5.1.0.199"
},
{
"model": "sz-300",
"scope": "lt",
"trust": 1.0,
"vendor": "ruckuswireless",
"version": "3.6.2.0.795"
},
{
"model": "zonedirector 5000",
"scope": "eq",
"trust": 1.0,
"vendor": "ruckuswireless",
"version": "10.0.1.0.151"
},
{
"model": "scg200",
"scope": "lt",
"trust": 1.0,
"vendor": "ruckuswireless",
"version": "3.6.2.0.795"
},
{
"model": "zonedirector 1200",
"scope": "eq",
"trust": 1.0,
"vendor": "ruckuswireless",
"version": "10.2.1.0.218"
},
{
"model": "vsz",
"scope": "lt",
"trust": 1.0,
"vendor": "ruckuswireless",
"version": "3.6.2.0.795"
},
{
"model": "vsz",
"scope": null,
"trust": 0.8,
"vendor": "ruckus \u65e7 ruckus",
"version": null
},
{
"model": "zonedirector 3000",
"scope": null,
"trust": 0.8,
"vendor": "ruckus \u65e7 ruckus",
"version": null
},
{
"model": "sz-100",
"scope": null,
"trust": 0.8,
"vendor": "ruckus \u65e7 ruckus",
"version": null
},
{
"model": "t300",
"scope": null,
"trust": 0.8,
"vendor": "ruckus \u65e7 ruckus",
"version": null
},
{
"model": "r310",
"scope": null,
"trust": 0.8,
"vendor": "ruckus \u65e7 ruckus",
"version": null
},
{
"model": "r600",
"scope": null,
"trust": 0.8,
"vendor": "ruckus \u65e7 ruckus",
"version": null
},
{
"model": "zonedirector 5000",
"scope": null,
"trust": 0.8,
"vendor": "ruckus \u65e7 ruckus",
"version": null
},
{
"model": "r500",
"scope": null,
"trust": 0.8,
"vendor": "ruckus \u65e7 ruckus",
"version": null
},
{
"model": "zonedirector 1100",
"scope": null,
"trust": 0.8,
"vendor": "ruckus \u65e7 ruckus",
"version": null
},
{
"model": "scg200",
"scope": null,
"trust": 0.8,
"vendor": "ruckus \u65e7 ruckus",
"version": null
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2020-017630"
},
{
"db": "NVD",
"id": "CVE-2020-22662"
}
]
},
"cve": "CVE-2020-22662",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"exploitabilityScore": 3.9,
"id": "CVE-2020-22662",
"impactScore": 3.6,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 2.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "None",
"baseScore": 7.5,
"baseSeverity": "High",
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2020-22662",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2020-22662",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"id": "CVE-2020-22662",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2020-22662",
"trust": 0.8,
"value": "High"
},
{
"author": "CNNVD",
"id": "CNNVD-202301-1621",
"trust": 0.6,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2020-017630"
},
{
"db": "CNNVD",
"id": "CNNVD-202301-1621"
},
{
"db": "NVD",
"id": "CVE-2020-22662"
},
{
"db": "NVD",
"id": "CVE-2020-22662"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "In Ruckus R310 10.5.1.0.199, Ruckus R500 10.5.1.0.199, Ruckus R600 10.5.1.0.199, Ruckus T300 10.5.1.0.199, Ruckus T301n 10.5.1.0.199, Ruckus T301s 10.5.1.0.199, SmartCell Gateway 200 (SCG200) before 3.6.2.0.795, SmartZone 100 (SZ-100) before 3.6.2.0.795, SmartZone 300 (SZ300) before 3.6.2.0.795, Virtual SmartZone (vSZ) before 3.6.2.0.795, ZoneDirector 1100 9.10.2.0.130, ZoneDirector 1200 10.2.1.0.218, ZoneDirector 3000 10.2.1.0.218, ZoneDirector 5000 10.0.1.0.151, a vulnerability allows attackers to change and set unauthorized \"illegal region code\" by remote code Execution command injection which leads to run illegal frequency with maxi output power. Vulnerability allows attacker to create an arbitrary amount of ssid wlans interface per radio which creates overhead over noise (the default max limit is 8 ssid only per radio in solo AP). Vulnerability allows attacker to unlock hidden regions by privilege command injection in WEB GUI. plural Ruckus Networks ( Old Ruckus Wireless, Inc.) Contains a command injection vulnerability.Information may be tampered with",
"sources": [
{
"db": "NVD",
"id": "CVE-2020-22662"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-017630"
},
{
"db": "VULMON",
"id": "CVE-2020-22662"
}
],
"trust": 1.71
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2020-22662",
"trust": 3.4
},
{
"db": "JVNDB",
"id": "JVNDB-2020-017630",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-202301-1621",
"trust": 0.6
},
{
"db": "OTHER",
"id": "NONE",
"trust": 0.1
},
{
"db": "VULMON",
"id": "CVE-2020-22662",
"trust": 0.1
}
],
"sources": [
{
"db": "OTHER",
"id": null
},
{
"db": "VULMON",
"id": "CVE-2020-22662"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-017630"
},
{
"db": "CNNVD",
"id": "CNNVD-202301-1621"
},
{
"db": "NVD",
"id": "CVE-2020-22662"
}
]
},
"id": "VAR-202301-1662",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "OTHER",
"id": null
}
],
"trust": 0.01
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"network device"
],
"sub_category": "access point",
"trust": 0.1
}
],
"sources": [
{
"db": "OTHER",
"id": null
}
]
},
"last_update_date": "2025-04-04T23:31:31.610000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Security\u00a0Bulletin\u00a020200302",
"trust": 0.8,
"url": "https://support.ruckuswireless.com/security_bulletins/302"
},
{
"title": "Ruckus Networks Repair measures for command injection vulnerabilities in multiple products",
"trust": 0.6,
"url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=223507"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2020-017630"
},
{
"db": "CNNVD",
"id": "CNNVD-202301-1621"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-77",
"trust": 1.0
},
{
"problemtype": "Command injection (CWE-77) [NVD evaluation ]",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2020-017630"
},
{
"db": "NVD",
"id": "CVE-2020-22662"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.7,
"url": "https://support.ruckuswireless.com/security_bulletins/302"
},
{
"trust": 1.0,
"url": "https://hdhrmi.blogspot.com/2020/03/multiple-vulnerabilities-in-ruckus.html?m=1"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-22662"
},
{
"trust": 0.6,
"url": "https://cxsecurity.com/cveshow/cve-2020-22662/"
},
{
"trust": 0.1,
"url": "https://ieeexplore.ieee.org/abstract/document/10769424"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
}
],
"sources": [
{
"db": "OTHER",
"id": null
},
{
"db": "VULMON",
"id": "CVE-2020-22662"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-017630"
},
{
"db": "CNNVD",
"id": "CNNVD-202301-1621"
},
{
"db": "NVD",
"id": "CVE-2020-22662"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "OTHER",
"id": null
},
{
"db": "VULMON",
"id": "CVE-2020-22662"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-017630"
},
{
"db": "CNNVD",
"id": "CNNVD-202301-1621"
},
{
"db": "NVD",
"id": "CVE-2020-22662"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2023-01-20T00:00:00",
"db": "VULMON",
"id": "CVE-2020-22662"
},
{
"date": "2023-07-11T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2020-017630"
},
{
"date": "2023-01-20T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202301-1621"
},
{
"date": "2023-01-20T19:15:13.063000",
"db": "NVD",
"id": "CVE-2020-22662"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2023-01-23T00:00:00",
"db": "VULMON",
"id": "CVE-2020-22662"
},
{
"date": "2023-07-11T06:53:00",
"db": "JVNDB",
"id": "JVNDB-2020-017630"
},
{
"date": "2023-02-02T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202301-1621"
},
{
"date": "2025-04-03T18:15:40.630000",
"db": "NVD",
"id": "CVE-2020-22662"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202301-1621"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural \u00a0Ruckus\u00a0Networks\u00a0( Old \u00a0Ruckus\u00a0Wireless,\u00a0Inc.)\u00a0 Command injection vulnerabilities in the product",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2020-017630"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "command injection",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202301-1621"
}
],
"trust": 0.6
}
}
VAR-202301-1812
Vulnerability from variot - Updated: 2025-04-04 22:36R310 firmware, R500 firmware, R600 firmware etc. Ruckus Networks ( Old Ruckus Wireless, Inc.) The product contains authentication vulnerabilities.Information may be obtained and information may be tampered with.
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202301-1812",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "zonedirector 1100",
"scope": "eq",
"trust": 1.0,
"vendor": "ruckuswireless",
"version": "9.10.2.0.130"
},
{
"model": "t301s",
"scope": "eq",
"trust": 1.0,
"vendor": "ruckuswireless",
"version": "10.5.1.0.199"
},
{
"model": "r500",
"scope": "eq",
"trust": 1.0,
"vendor": "ruckuswireless",
"version": "10.5.1.0.199"
},
{
"model": "r310",
"scope": "eq",
"trust": 1.0,
"vendor": "ruckuswireless",
"version": "10.5.1.0.199"
},
{
"model": "r600",
"scope": "eq",
"trust": 1.0,
"vendor": "ruckuswireless",
"version": "10.5.1.0.199"
},
{
"model": "t301n",
"scope": "eq",
"trust": 1.0,
"vendor": "ruckuswireless",
"version": "10.5.1.0.199"
},
{
"model": "zonedirector 3000",
"scope": "eq",
"trust": 1.0,
"vendor": "ruckuswireless",
"version": "10.2.1.0.218"
},
{
"model": "sz-100",
"scope": "lt",
"trust": 1.0,
"vendor": "ruckuswireless",
"version": "3.6.2.0.795"
},
{
"model": "t300",
"scope": "eq",
"trust": 1.0,
"vendor": "ruckuswireless",
"version": "10.5.1.0.199"
},
{
"model": "sz-300",
"scope": "lt",
"trust": 1.0,
"vendor": "ruckuswireless",
"version": "3.6.2.0.795"
},
{
"model": "zonedirector 5000",
"scope": "eq",
"trust": 1.0,
"vendor": "ruckuswireless",
"version": "10.0.1.0.151"
},
{
"model": "scg200",
"scope": "lt",
"trust": 1.0,
"vendor": "ruckuswireless",
"version": "3.6.2.0.795"
},
{
"model": "zonedirector 1200",
"scope": "eq",
"trust": 1.0,
"vendor": "ruckuswireless",
"version": "10.2.1.0.218"
},
{
"model": "vsz",
"scope": "lt",
"trust": 1.0,
"vendor": "ruckuswireless",
"version": "3.6.2.0.795"
},
{
"model": "t301s",
"scope": null,
"trust": 0.8,
"vendor": "ruckus \u65e7 ruckus",
"version": null
},
{
"model": "sz-300",
"scope": null,
"trust": 0.8,
"vendor": "ruckus \u65e7 ruckus",
"version": null
},
{
"model": "r310",
"scope": null,
"trust": 0.8,
"vendor": "ruckus \u65e7 ruckus",
"version": null
},
{
"model": "scg200",
"scope": null,
"trust": 0.8,
"vendor": "ruckus \u65e7 ruckus",
"version": null
},
{
"model": "t300",
"scope": null,
"trust": 0.8,
"vendor": "ruckus \u65e7 ruckus",
"version": null
},
{
"model": "r600",
"scope": null,
"trust": 0.8,
"vendor": "ruckus \u65e7 ruckus",
"version": null
},
{
"model": "t301n",
"scope": null,
"trust": 0.8,
"vendor": "ruckus \u65e7 ruckus",
"version": null
},
{
"model": "sz-100",
"scope": null,
"trust": 0.8,
"vendor": "ruckus \u65e7 ruckus",
"version": null
},
{
"model": "r500",
"scope": null,
"trust": 0.8,
"vendor": "ruckus \u65e7 ruckus",
"version": null
},
{
"model": "vsz",
"scope": null,
"trust": 0.8,
"vendor": "ruckus \u65e7 ruckus",
"version": null
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2020-017615"
},
{
"db": "NVD",
"id": "CVE-2020-22657"
}
]
},
"cve": "CVE-2020-22657",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 3.9,
"id": "CVE-2020-22657",
"impactScore": 5.2,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 2.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "None",
"baseScore": 9.1,
"baseSeverity": "Critical",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "CVE-2020-22657",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2020-22657",
"trust": 1.0,
"value": "CRITICAL"
},
{
"author": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"id": "CVE-2020-22657",
"trust": 1.0,
"value": "CRITICAL"
},
{
"author": "NVD",
"id": "CVE-2020-22657",
"trust": 0.8,
"value": "Critical"
},
{
"author": "CNNVD",
"id": "CNNVD-202301-1629",
"trust": 0.6,
"value": "CRITICAL"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2020-017615"
},
{
"db": "CNNVD",
"id": "CNNVD-202301-1629"
},
{
"db": "NVD",
"id": "CVE-2020-22657"
},
{
"db": "NVD",
"id": "CVE-2020-22657"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "R310 firmware, R500 firmware, R600 firmware etc. Ruckus Networks ( Old Ruckus Wireless, Inc.) The product contains authentication vulnerabilities.Information may be obtained and information may be tampered with.",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2020-017615"
}
],
"trust": 0.8
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2020-22657",
"trust": 3.4
},
{
"db": "JVNDB",
"id": "JVNDB-2020-017615",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-202301-1629",
"trust": 0.6
},
{
"db": "OTHER",
"id": "NONE",
"trust": 0.1
},
{
"db": "VULMON",
"id": "CVE-2020-22657",
"trust": 0.1
}
],
"sources": [
{
"db": "OTHER",
"id": null
},
{
"db": "VULMON",
"id": "CVE-2020-22657"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-017615"
},
{
"db": "CNNVD",
"id": "CNNVD-202301-1629"
},
{
"db": "NVD",
"id": "CVE-2020-22657"
}
]
},
"id": "VAR-202301-1812",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "OTHER",
"id": null
}
],
"trust": 0.01
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"network device"
],
"sub_category": "gateway",
"trust": 0.1
}
],
"sources": [
{
"db": "OTHER",
"id": null
}
]
},
"last_update_date": "2025-04-04T22:36:42.625000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Ruckus Networks Unleashed C110 Remediation measures for authorization problem vulnerabilities",
"trust": 0.6,
"url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=223297"
}
],
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202301-1629"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-287",
"trust": 1.0
},
{
"problemtype": "Inappropriate authentication (CWE-287) [NVD evaluation ]",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2020-017615"
},
{
"db": "NVD",
"id": "CVE-2020-22657"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.5,
"url": "https://support.ruckuswireless.com/security_bulletins/302"
},
{
"trust": 1.0,
"url": "https://hdhrmi.blogspot.com/2020/03/multiple-vulnerabilities-in-ruckus.html?m=1"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-22657"
},
{
"trust": 0.6,
"url": "https://cxsecurity.com/cveshow/cve-2020-22657/"
},
{
"trust": 0.1,
"url": "https://ieeexplore.ieee.org/abstract/document/10769424"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
}
],
"sources": [
{
"db": "OTHER",
"id": null
},
{
"db": "VULMON",
"id": "CVE-2020-22657"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-017615"
},
{
"db": "CNNVD",
"id": "CNNVD-202301-1629"
},
{
"db": "NVD",
"id": "CVE-2020-22657"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "OTHER",
"id": null
},
{
"db": "VULMON",
"id": "CVE-2020-22657"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-017615"
},
{
"db": "CNNVD",
"id": "CNNVD-202301-1629"
},
{
"db": "NVD",
"id": "CVE-2020-22657"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2023-01-20T00:00:00",
"db": "VULMON",
"id": "CVE-2020-22657"
},
{
"date": "2023-07-05T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2020-017615"
},
{
"date": "2023-01-20T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202301-1629"
},
{
"date": "2023-01-20T19:15:12.787000",
"db": "NVD",
"id": "CVE-2020-22657"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2023-01-23T00:00:00",
"db": "VULMON",
"id": "CVE-2020-22657"
},
{
"date": "2023-07-05T08:12:00",
"db": "JVNDB",
"id": "JVNDB-2020-017615"
},
{
"date": "2023-02-01T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202301-1629"
},
{
"date": "2025-04-03T18:15:39.810000",
"db": "NVD",
"id": "CVE-2020-22657"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202301-1629"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural \u00a0Ruckus\u00a0Networks\u00a0( Old \u00a0Ruckus\u00a0Wireless,\u00a0Inc.)\u00a0 Product certification vulnerabilities",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2020-017615"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "authorization issue",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202301-1629"
}
],
"trust": 0.6
}
}
VAR-201805-0638
Vulnerability from variot - Updated: 2025-01-30 20:17Ruckus SmartZone (formerly Virtual SmartCell Gateway or vSCG) 3.5.0, 3.5.1, 3.6.0, and 3.6.1 (Essentials and High Scale) on vSZ, SZ-100, SZ-300, and SCG-200 devices allows remote attackers to obtain sensitive information or modify data. Ruckus SmartZone Contains an information disclosure vulnerability.Information may be obtained and information may be altered. RuckusvSZ and others are wireless LAN controller products from Ruckus Wireless. SmartZone is one of the operating systems. There are security holes in SmartZone on several Ruckus products. The following products and versions are affected: Ruckus SmartZone Version 3.5.0, Version 3.5.1, Version 3.6.0, 3.6.1; vSZ; SZ-100; SZ-300; SCG-200
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201805-0638",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "sz-300",
"scope": "eq",
"trust": 1.6,
"vendor": "ruckuswireless",
"version": "3.5.0"
},
{
"model": "sz-300",
"scope": "eq",
"trust": 1.6,
"vendor": "ruckuswireless",
"version": "3.6.1"
},
{
"model": "sz-100",
"scope": "eq",
"trust": 1.6,
"vendor": "ruckuswireless",
"version": "3.6.0"
},
{
"model": "sz-100",
"scope": "eq",
"trust": 1.6,
"vendor": "ruckuswireless",
"version": "3.5.0"
},
{
"model": "sz-100",
"scope": "eq",
"trust": 1.6,
"vendor": "ruckuswireless",
"version": "3.6.1"
},
{
"model": "sz-100",
"scope": "eq",
"trust": 1.6,
"vendor": "ruckuswireless",
"version": "3.5.1"
},
{
"model": "sz-300",
"scope": "eq",
"trust": 1.6,
"vendor": "ruckuswireless",
"version": "3.6.0"
},
{
"model": "scg-200",
"scope": "eq",
"trust": 1.6,
"vendor": "ruckuswireless",
"version": "3.6.1"
},
{
"model": "sz-300",
"scope": "eq",
"trust": 1.6,
"vendor": "ruckuswireless",
"version": "3.5.1"
},
{
"model": "scg-200",
"scope": "eq",
"trust": 1.6,
"vendor": "ruckuswireless",
"version": "3.6.0"
},
{
"model": "vsz",
"scope": "eq",
"trust": 1.0,
"vendor": "ruckuswireless",
"version": "3.5.0"
},
{
"model": "vsz",
"scope": "eq",
"trust": 1.0,
"vendor": "ruckuswireless",
"version": "3.6.1"
},
{
"model": "vsz",
"scope": "eq",
"trust": 1.0,
"vendor": "ruckuswireless",
"version": "3.6.0"
},
{
"model": "scg-200",
"scope": "eq",
"trust": 1.0,
"vendor": "ruckuswireless",
"version": "3.5.0"
},
{
"model": "vsz",
"scope": "eq",
"trust": 1.0,
"vendor": "ruckuswireless",
"version": "3.5.1"
},
{
"model": "scg-200",
"scope": "eq",
"trust": 1.0,
"vendor": "ruckuswireless",
"version": "3.5.1"
},
{
"model": "scg-200",
"scope": "eq",
"trust": 0.8,
"vendor": "ruckus",
"version": "3.5.0"
},
{
"model": "scg-200",
"scope": "eq",
"trust": 0.8,
"vendor": "ruckus",
"version": "3.5.1"
},
{
"model": "scg-200",
"scope": "eq",
"trust": 0.8,
"vendor": "ruckus",
"version": "3.6.0"
},
{
"model": "scg-200",
"scope": "eq",
"trust": 0.8,
"vendor": "ruckus",
"version": "3.6.1"
},
{
"model": "sz-100",
"scope": "eq",
"trust": 0.8,
"vendor": "ruckus",
"version": "3.5.0"
},
{
"model": "sz-100",
"scope": "eq",
"trust": 0.8,
"vendor": "ruckus",
"version": "3.5.1"
},
{
"model": "sz-100",
"scope": "eq",
"trust": 0.8,
"vendor": "ruckus",
"version": "3.6.0"
},
{
"model": "sz-100",
"scope": "eq",
"trust": 0.8,
"vendor": "ruckus",
"version": "3.6.1"
},
{
"model": "sz-300",
"scope": "eq",
"trust": 0.8,
"vendor": "ruckus",
"version": "3.5.0"
},
{
"model": "sz-300",
"scope": "eq",
"trust": 0.8,
"vendor": "ruckus",
"version": "3.5.1"
},
{
"model": "sz-300",
"scope": "eq",
"trust": 0.8,
"vendor": "ruckus",
"version": "3.6.0"
},
{
"model": "sz-300",
"scope": "eq",
"trust": 0.8,
"vendor": "ruckus",
"version": "3.6.1"
},
{
"model": "vsz",
"scope": "eq",
"trust": 0.8,
"vendor": "ruckus",
"version": "3.5.0"
},
{
"model": "vsz",
"scope": "eq",
"trust": 0.8,
"vendor": "ruckus",
"version": "3.5.1"
},
{
"model": "vsz",
"scope": "eq",
"trust": 0.8,
"vendor": "ruckus",
"version": "3.6.0"
},
{
"model": "vsz",
"scope": "eq",
"trust": 0.8,
"vendor": "ruckus",
"version": "3.6.1"
},
{
"model": "wireless ruckus smartzone",
"scope": "eq",
"trust": 0.6,
"vendor": "ruckus",
"version": "3.5.0"
},
{
"model": "wireless ruckus smartzone",
"scope": "eq",
"trust": 0.6,
"vendor": "ruckus",
"version": "3.5.1"
},
{
"model": "wireless ruckus smartzone",
"scope": "eq",
"trust": 0.6,
"vendor": "ruckus",
"version": "3.6.0"
},
{
"model": "wireless ruckus smartzone",
"scope": "eq",
"trust": 0.6,
"vendor": "ruckus",
"version": "3.6.1"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2018-10905"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-006324"
},
{
"db": "CNNVD",
"id": "CNNVD-201805-1235"
},
{
"db": "NVD",
"id": "CVE-2018-11036"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/o:ruckus_wireless:scg-200_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:ruckus_wireless:sz-100_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:ruckus_wireless:sz-300_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:ruckus_wireless:vsz_firmware",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2018-006324"
}
]
},
"cve": "CVE-2018-11036",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CVE-2018-11036",
"impactScore": 4.9,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 1.8,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CNVD-2018-10905",
"impactScore": 4.9,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "VHN-120855",
"impactScore": 4.9,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:N",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 3.9,
"id": "CVE-2018-11036",
"impactScore": 5.2,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.8,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2018-11036",
"trust": 1.0,
"value": "CRITICAL"
},
{
"author": "NVD",
"id": "CVE-2018-11036",
"trust": 0.8,
"value": "Critical"
},
{
"author": "CNVD",
"id": "CNVD-2018-10905",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201805-1235",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-120855",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2018-10905"
},
{
"db": "VULHUB",
"id": "VHN-120855"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-006324"
},
{
"db": "CNNVD",
"id": "CNNVD-201805-1235"
},
{
"db": "NVD",
"id": "CVE-2018-11036"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Ruckus SmartZone (formerly Virtual SmartCell Gateway or vSCG) 3.5.0, 3.5.1, 3.6.0, and 3.6.1 (Essentials and High Scale) on vSZ, SZ-100, SZ-300, and SCG-200 devices allows remote attackers to obtain sensitive information or modify data. Ruckus SmartZone Contains an information disclosure vulnerability.Information may be obtained and information may be altered. RuckusvSZ and others are wireless LAN controller products from Ruckus Wireless. SmartZone is one of the operating systems. There are security holes in SmartZone on several Ruckus products. The following products and versions are affected: Ruckus SmartZone Version 3.5.0, Version 3.5.1, Version 3.6.0, 3.6.1; vSZ; SZ-100; SZ-300; SCG-200",
"sources": [
{
"db": "NVD",
"id": "CVE-2018-11036"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-006324"
},
{
"db": "CNVD",
"id": "CNVD-2018-10905"
},
{
"db": "VULHUB",
"id": "VHN-120855"
}
],
"trust": 2.25
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2018-11036",
"trust": 3.2
},
{
"db": "JVNDB",
"id": "JVNDB-2018-006324",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201805-1235",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2018-10905",
"trust": 0.6
},
{
"db": "OTHER",
"id": "NONE",
"trust": 0.1
},
{
"db": "VULHUB",
"id": "VHN-120855",
"trust": 0.1
}
],
"sources": [
{
"db": "OTHER",
"id": null
},
{
"db": "CNVD",
"id": "CNVD-2018-10905"
},
{
"db": "VULHUB",
"id": "VHN-120855"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-006324"
},
{
"db": "CNNVD",
"id": "CNNVD-201805-1235"
},
{
"db": "NVD",
"id": "CVE-2018-11036"
}
]
},
"id": "VAR-201805-0638",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "OTHER",
"id": null
},
{
"db": "CNVD",
"id": "CNVD-2018-10905"
},
{
"db": "VULHUB",
"id": "VHN-120855"
}
],
"trust": 1.8
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
},
{
"category": [
"network device"
],
"sub_category": "gateway",
"trust": 0.1
}
],
"sources": [
{
"db": "OTHER",
"id": null
},
{
"db": "CNVD",
"id": "CNVD-2018-10905"
}
]
},
"last_update_date": "2025-01-30T20:17:24.326000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Ruckus SmartZone Sensitive Information Disclosure Vulnerability",
"trust": 0.8,
"url": "https://www.ruckuswireless.com/security/279/view/txt"
},
{
"title": "Patch of multiple Ruckus products SmartZone information disclosure vulnerability",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/131197"
},
{
"title": "Multiple Ruckus product SmartZone Security vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=81246"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2018-10905"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-006324"
},
{
"db": "CNNVD",
"id": "CNNVD-201805-1235"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-200",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-120855"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-006324"
},
{
"db": "NVD",
"id": "CVE-2018-11036"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.3,
"url": "https://www.ruckuswireless.com/security/279/view/txt"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-11036"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-11036"
},
{
"trust": 0.1,
"url": "https://ieeexplore.ieee.org/abstract/document/10769424"
}
],
"sources": [
{
"db": "OTHER",
"id": null
},
{
"db": "CNVD",
"id": "CNVD-2018-10905"
},
{
"db": "VULHUB",
"id": "VHN-120855"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-006324"
},
{
"db": "CNNVD",
"id": "CNNVD-201805-1235"
},
{
"db": "NVD",
"id": "CVE-2018-11036"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "OTHER",
"id": null
},
{
"db": "CNVD",
"id": "CNVD-2018-10905"
},
{
"db": "VULHUB",
"id": "VHN-120855"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-006324"
},
{
"db": "CNNVD",
"id": "CNNVD-201805-1235"
},
{
"db": "NVD",
"id": "CVE-2018-11036"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2018-06-04T00:00:00",
"db": "CNVD",
"id": "CNVD-2018-10905"
},
{
"date": "2018-05-31T00:00:00",
"db": "VULHUB",
"id": "VHN-120855"
},
{
"date": "2018-08-16T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2018-006324"
},
{
"date": "2018-06-01T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201805-1235"
},
{
"date": "2018-05-31T12:29:00.220000",
"db": "NVD",
"id": "CVE-2018-11036"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2018-06-04T00:00:00",
"db": "CNVD",
"id": "CNVD-2018-10905"
},
{
"date": "2018-08-01T00:00:00",
"db": "VULHUB",
"id": "VHN-120855"
},
{
"date": "2018-08-16T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2018-006324"
},
{
"date": "2018-06-04T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201805-1235"
},
{
"date": "2024-11-21T03:42:32.317000",
"db": "NVD",
"id": "CVE-2018-11036"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201805-1235"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Ruckus SmartZone Vulnerable to information disclosure",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2018-006324"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "information disclosure",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201805-1235"
}
],
"trust": 0.6
}
}