Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2017-6224
Deferred
More InfoOfficial Page
Source-sirt@brocade.com
View Known Exploited Vulnerability (KEV) details
Published At-13 Oct, 2017 | 17:29
Updated At-20 Apr, 2025 | 01:37

Ruckus Wireless Zone Director Controller firmware releases ZD9.x, ZD10.0.0.x, ZD10.0.1.x (less than 10.0.1.0.17 MR1 release) and Ruckus Wireless Unleashed AP Firmware releases 200.0.x, 200.1.x, 200.2.x, 200.3.x, 200.4.x. contain OS Command Injection vulnerabilities that could allow local authenticated users to execute arbitrary privileged commands on the underlying operating system by appending those commands in the Common Name field in the Certificate Generation Request.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.08.8HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Primary2.09.3HIGH
AV:N/AC:M/Au:N/C:C/I:C/A:C
CPE Matches

ruckuswireless
ruckuswireless
>>zonedirector_firmware>>zd9.9.0.0.205
cpe:2.3:o:ruckuswireless:zonedirector_firmware:zd9.9.0.0.205:*:*:*:*:*:*:*
ruckuswireless
ruckuswireless
>>zonedirector_firmware>>zd9.9.0.0.212
cpe:2.3:o:ruckuswireless:zonedirector_firmware:zd9.9.0.0.212:*:*:*:*:*:*:*
ruckuswireless
ruckuswireless
>>zonedirector_firmware>>zd9.9.0.0.216
cpe:2.3:o:ruckuswireless:zonedirector_firmware:zd9.9.0.0.216:*:*:*:*:*:*:*
ruckuswireless
ruckuswireless
>>zonedirector_firmware>>zd9.10.0.0.218
cpe:2.3:o:ruckuswireless:zonedirector_firmware:zd9.10.0.0.218:*:*:*:*:*:*:*
ruckuswireless
ruckuswireless
>>zonedirector_firmware>>zd9.13.0.0.103
cpe:2.3:o:ruckuswireless:zonedirector_firmware:zd9.13.0.0.103:*:*:*:*:*:*:*
ruckuswireless
ruckuswireless
>>zonedirector_firmware>>zd9.13.0.0.209
cpe:2.3:o:ruckuswireless:zonedirector_firmware:zd9.13.0.0.209:*:*:*:*:*:*:*
ruckuswireless
ruckuswireless
>>zonedirector>>-
cpe:2.3:h:ruckuswireless:zonedirector:-:*:*:*:*:*:*:*
ruckuswireless
ruckuswireless
>>unleashed_firmware>>200.1
cpe:2.3:o:ruckuswireless:unleashed_firmware:200.1:*:*:*:*:*:*:*
ruckuswireless
ruckuswireless
>>unleashed_firmware>>200.1.9.12.55
cpe:2.3:o:ruckuswireless:unleashed_firmware:200.1.9.12.55:*:*:*:*:*:*:*
ruckuswireless
ruckuswireless
>>unleashed_firmware>>200.3
cpe:2.3:o:ruckuswireless:unleashed_firmware:200.3:*:*:*:*:*:*:*
ruckuswireless
ruckuswireless
>>unleashed_firmware>>200.3.9.13.228
cpe:2.3:o:ruckuswireless:unleashed_firmware:200.3.9.13.228:*:*:*:*:*:*:*
ruckuswireless
ruckuswireless
>>unleashed_firmware>>200.4.9.13
cpe:2.3:o:ruckuswireless:unleashed_firmware:200.4.9.13:*:*:*:*:*:*:*
ruckuswireless
ruckuswireless
>>unleashed_firmware>>200.4.9.13.47
cpe:2.3:o:ruckuswireless:unleashed_firmware:200.4.9.13.47:*:*:*:*:*:*:*
ruckuswireless
ruckuswireless
>>unleashed>>-
cpe:2.3:h:ruckuswireless:unleashed:-:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-78Primarynvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://ruckus-www.s3.amazonaws.com/pdf/security/faq-security-advisory-id-092917.txtsirt@brocade.com
Third Party Advisory
https://ruckus-www.s3.amazonaws.com/pdf/security/faq-security-advisory-id-092917.txtaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
Change History
0Changes found

Details not found