Search criteria
2 vulnerabilities found for zonedirector by ruckus
VAR-201710-1310
Vulnerability from variot - Updated: 2025-04-20 23:32Ruckus Wireless Zone Director Controller firmware releases ZD9.9.x, ZD9.10.x, ZD9.13.0.x less than 9.13.0.0.232 contain OS Command Injection vulnerabilities in the ping functionality that could allow local authenticated users to execute arbitrary privileged commands on the underlying operating system. Ruckus Wireless Zone Director Controller is an enterprise-level intelligent wireless local area network (WLAN) controller from Ruckus Wireless. It can centrally manage all intelligent access points in the WLAN and provide hotspot identity authentication, Entry point detection and other functions. A local attacker could exploit this vulnerability to execute arbitrary commands on the underlying operating system
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201710-1310",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "zonedirector",
"scope": "eq",
"trust": 1.6,
"vendor": "ruckus",
"version": "zd9.10.0.0.218"
},
{
"model": "zonedirector",
"scope": "eq",
"trust": 1.6,
"vendor": "ruckus",
"version": "zd9.9.0.0.205"
},
{
"model": "zonedirector",
"scope": "eq",
"trust": 1.6,
"vendor": "ruckus",
"version": "zd9.9.0.0.216"
},
{
"model": "zonedirector",
"scope": "eq",
"trust": 1.6,
"vendor": "ruckus",
"version": "zd9.13.0.0.209"
},
{
"model": "zonedirector",
"scope": "eq",
"trust": 1.6,
"vendor": "ruckus",
"version": "zd9.13.0.0.103"
},
{
"model": "zonedirector",
"scope": "eq",
"trust": 1.6,
"vendor": "ruckus",
"version": "zd9.9.0.0.212"
},
{
"model": "zonedirector",
"scope": null,
"trust": 0.8,
"vendor": "ruckus",
"version": null
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2017-009206"
},
{
"db": "CNNVD",
"id": "CNNVD-201702-813"
},
{
"db": "NVD",
"id": "CVE-2017-6223"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/h:ruckus_wireless:zonedirector_firmware",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2017-009206"
}
]
},
"cve": "CVE-2017-6223",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 8.6,
"id": "CVE-2017-6223",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 1.8,
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 8.6,
"id": "VHN-114426",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:M/AU:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 2.8,
"id": "CVE-2017-6223",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.8,
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2017-6223",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2017-6223",
"trust": 0.8,
"value": "High"
},
{
"author": "CNNVD",
"id": "CNNVD-201702-813",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "VULHUB",
"id": "VHN-114426",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-114426"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-009206"
},
{
"db": "CNNVD",
"id": "CNNVD-201702-813"
},
{
"db": "NVD",
"id": "CVE-2017-6223"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Ruckus Wireless Zone Director Controller firmware releases ZD9.9.x, ZD9.10.x, ZD9.13.0.x less than 9.13.0.0.232 contain OS Command Injection vulnerabilities in the ping functionality that could allow local authenticated users to execute arbitrary privileged commands on the underlying operating system. Ruckus Wireless Zone Director Controller is an enterprise-level intelligent wireless local area network (WLAN) controller from Ruckus Wireless. It can centrally manage all intelligent access points in the WLAN and provide hotspot identity authentication, Entry point detection and other functions. A local attacker could exploit this vulnerability to execute arbitrary commands on the underlying operating system",
"sources": [
{
"db": "NVD",
"id": "CVE-2017-6223"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-009206"
},
{
"db": "VULHUB",
"id": "VHN-114426"
}
],
"trust": 1.71
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2017-6223",
"trust": 2.5
},
{
"db": "JVNDB",
"id": "JVNDB-2017-009206",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201702-813",
"trust": 0.7
},
{
"db": "VULHUB",
"id": "VHN-114426",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-114426"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-009206"
},
{
"db": "CNNVD",
"id": "CNNVD-201702-813"
},
{
"db": "NVD",
"id": "CVE-2017-6223"
}
]
},
"id": "VAR-201710-1310",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-114426"
}
],
"trust": 0.01
},
"last_update_date": "2025-04-20T23:32:03.131000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "ZoneDirector",
"trust": 0.8,
"url": "https://www.ruckuswireless.com/ja/products/system-management-control/zonedirector-controllers"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2017-009206"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-78",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-114426"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-009206"
},
{
"db": "NVD",
"id": "CVE-2017-6223"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.5,
"url": "https://ruckus-www.s3.amazonaws.com/pdf/security/faq-security-advisory-id-092917.txt"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-6223"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-6223"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-114426"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-009206"
},
{
"db": "CNNVD",
"id": "CNNVD-201702-813"
},
{
"db": "NVD",
"id": "CVE-2017-6223"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULHUB",
"id": "VHN-114426"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-009206"
},
{
"db": "CNNVD",
"id": "CNNVD-201702-813"
},
{
"db": "NVD",
"id": "CVE-2017-6223"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-10-13T00:00:00",
"db": "VULHUB",
"id": "VHN-114426"
},
{
"date": "2017-11-06T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2017-009206"
},
{
"date": "2017-02-24T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201702-813"
},
{
"date": "2017-10-13T17:29:01.113000",
"db": "NVD",
"id": "CVE-2017-6223"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-10-27T00:00:00",
"db": "VULHUB",
"id": "VHN-114426"
},
{
"date": "2017-11-06T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2017-009206"
},
{
"date": "2017-10-18T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201702-813"
},
{
"date": "2025-04-20T01:37:25.860000",
"db": "NVD",
"id": "CVE-2017-6223"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201702-813"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Ruckus Wireless Zone Director In controller firmware OS Command injection vulnerability",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2017-009206"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "operating system commend injection",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201702-813"
}
],
"trust": 0.6
}
}
VAR-201710-1311
Vulnerability from variot - Updated: 2025-04-20 23:23Ruckus Wireless Zone Director Controller firmware releases ZD9.x, ZD10.0.0.x, ZD10.0.1.x (less than 10.0.1.0.17 MR1 release) and Ruckus Wireless Unleashed AP Firmware releases 200.0.x, 200.1.x, 200.2.x, 200.3.x, 200.4.x. contain OS Command Injection vulnerabilities that could allow local authenticated users to execute arbitrary privileged commands on the underlying operating system by appending those commands in the Common Name field in the Certificate Generation Request. A local attacker could exploit this vulnerability to execute arbitrary commands
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201710-1311",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "unleashed",
"scope": "eq",
"trust": 1.6,
"vendor": "ruckuswireless",
"version": "200.1"
},
{
"model": "zonedirector",
"scope": "eq",
"trust": 1.6,
"vendor": "ruckuswireless",
"version": "zd9.9.0.0.212"
},
{
"model": "unleashed",
"scope": "eq",
"trust": 1.6,
"vendor": "ruckuswireless",
"version": "200.1.9.12.55"
},
{
"model": "unleashed",
"scope": "eq",
"trust": 1.6,
"vendor": "ruckuswireless",
"version": "200.3"
},
{
"model": "zonedirector",
"scope": "eq",
"trust": 1.6,
"vendor": "ruckuswireless",
"version": "zd9.10.0.0.218"
},
{
"model": "zonedirector",
"scope": "eq",
"trust": 1.6,
"vendor": "ruckuswireless",
"version": "zd9.9.0.0.216"
},
{
"model": "unleashed",
"scope": "eq",
"trust": 1.6,
"vendor": "ruckuswireless",
"version": "200.3.9.13.228"
},
{
"model": "zonedirector",
"scope": "eq",
"trust": 1.6,
"vendor": "ruckuswireless",
"version": "zd9.9.0.0.205"
},
{
"model": "zonedirector",
"scope": "eq",
"trust": 1.6,
"vendor": "ruckuswireless",
"version": "zd9.13.0.0.103"
},
{
"model": "zonedirector",
"scope": "eq",
"trust": 1.6,
"vendor": "ruckuswireless",
"version": "zd9.13.0.0.209"
},
{
"model": "unleashed",
"scope": "eq",
"trust": 1.0,
"vendor": "ruckuswireless",
"version": "200.4.9.13"
},
{
"model": "unleashed",
"scope": "eq",
"trust": 1.0,
"vendor": "ruckuswireless",
"version": "200.4.9.13.47"
},
{
"model": "unleashed",
"scope": null,
"trust": 0.8,
"vendor": "ruckus",
"version": null
},
{
"model": "zonedirector",
"scope": null,
"trust": 0.8,
"vendor": "ruckus",
"version": null
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2017-009284"
},
{
"db": "CNNVD",
"id": "CNNVD-201702-812"
},
{
"db": "NVD",
"id": "CVE-2017-6224"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/o:ruckus_wireless:unleashed_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:ruckus_wireless:zonedirector_firmware",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2017-009284"
}
]
},
"cve": "CVE-2017-6224",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 8.6,
"id": "CVE-2017-6224",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 1.8,
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 8.6,
"id": "VHN-114427",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:M/AU:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 2.8,
"id": "CVE-2017-6224",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.8,
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2017-6224",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2017-6224",
"trust": 0.8,
"value": "High"
},
{
"author": "CNNVD",
"id": "CNNVD-201702-812",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-114427",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-114427"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-009284"
},
{
"db": "CNNVD",
"id": "CNNVD-201702-812"
},
{
"db": "NVD",
"id": "CVE-2017-6224"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Ruckus Wireless Zone Director Controller firmware releases ZD9.x, ZD10.0.0.x, ZD10.0.1.x (less than 10.0.1.0.17 MR1 release) and Ruckus Wireless Unleashed AP Firmware releases 200.0.x, 200.1.x, 200.2.x, 200.3.x, 200.4.x. contain OS Command Injection vulnerabilities that could allow local authenticated users to execute arbitrary privileged commands on the underlying operating system by appending those commands in the Common Name field in the Certificate Generation Request. A local attacker could exploit this vulnerability to execute arbitrary commands",
"sources": [
{
"db": "NVD",
"id": "CVE-2017-6224"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-009284"
},
{
"db": "VULHUB",
"id": "VHN-114427"
}
],
"trust": 1.71
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2017-6224",
"trust": 2.5
},
{
"db": "JVNDB",
"id": "JVNDB-2017-009284",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201702-812",
"trust": 0.7
},
{
"db": "VULHUB",
"id": "VHN-114427",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-114427"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-009284"
},
{
"db": "CNNVD",
"id": "CNNVD-201702-812"
},
{
"db": "NVD",
"id": "CVE-2017-6224"
}
]
},
"id": "VAR-201710-1311",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-114427"
}
],
"trust": 0.01
},
"last_update_date": "2025-04-20T23:23:34.256000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Ruckus Unleashed",
"trust": 0.8,
"url": "https://www.ruckuswireless.com/ja/products/system-management-control/unleashed"
},
{
"title": "ZoneDirector",
"trust": 0.8,
"url": "https://www.ruckuswireless.com/ja/products/system-management-control/zonedirector-controllers"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2017-009284"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-78",
"trust": 1.1
},
{
"problemtype": "CWE-77",
"trust": 0.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-114427"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-009284"
},
{
"db": "NVD",
"id": "CVE-2017-6224"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.5,
"url": "https://ruckus-www.s3.amazonaws.com/pdf/security/faq-security-advisory-id-092917.txt"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-6224"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-6224"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-114427"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-009284"
},
{
"db": "CNNVD",
"id": "CNNVD-201702-812"
},
{
"db": "NVD",
"id": "CVE-2017-6224"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULHUB",
"id": "VHN-114427"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-009284"
},
{
"db": "CNNVD",
"id": "CNNVD-201702-812"
},
{
"db": "NVD",
"id": "CVE-2017-6224"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-10-13T00:00:00",
"db": "VULHUB",
"id": "VHN-114427"
},
{
"date": "2017-11-08T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2017-009284"
},
{
"date": "2017-02-24T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201702-812"
},
{
"date": "2017-10-13T17:29:01.160000",
"db": "NVD",
"id": "CVE-2017-6224"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2019-10-03T00:00:00",
"db": "VULHUB",
"id": "VHN-114427"
},
{
"date": "2017-11-08T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2017-009284"
},
{
"date": "2019-10-23T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201702-812"
},
{
"date": "2025-04-20T01:37:25.860000",
"db": "NVD",
"id": "CVE-2017-6224"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201702-812"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Ruckus Wireless Zone Director Controller and Unleashed AP Command injection vulnerability in some firmware",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2017-009284"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "operating system commend injection",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201702-812"
}
],
"trust": 0.6
}
}