Published:2023/12/01 Last Updated:2023/12/01
JVN#45891816
Ruckus Access Point vulnerable to cross-site scripting
Overview
Ruckus Access Point contains a cross-site scripting vulnerability.
Products Affected
The following Ruckus Access Points are affected by this vulnerability.
- ZoneDirector: versions 10.5.1 and earlier
- SmartZone: versions 6.1.1 and earlier
- AP Solo:
- R750, R650, R730, T750 versions 114.0.0.0.6565 and earlier
- R550, R850, T750SE versions 114.0.0.0.5585 and earlier
- R510, T310D, E510, C110, R320, H510, H320, T310S, T310N, T310C, T305, M510 versions 114.0.0.0.6565 and earlier
- R720, R710, T710, T710s, T610, T610s, R610 versions 114.0.0.0.6565 and earlier
- R310 versions 110.0.0.0.2014 and earlier
- R760 versions 118.1.0.0.1274 and earlier
- R560 versions 118.1.0.0.1908 and earlier
- H550 versions 116.0.0.0.1506 and earlier
- H350 versions 116.0.0.0.3128 and earlier
- T350c versions 116.0.0.0.1543 and earlier
- T350d versions 116.0.0.0.1543 and earlier
- T350se versions 116.0.0.0.3136 and earlier
- R350 versions 116.0.0.0.1655 and earlier
Description
Ruckus Access Point provided by CommScope, Inc. contains a cross-site scripting vulnerability (CWE-79).
Impact
An arbitrary script may be executed on the web browser of the user who is logging in the product.
Solution
Update the Software
Update the software to the latest version according to the information provided by the developer.
The developer addressed the vulnerability in the following versions:
- ZoneDirector 10.5.1.0.255 or later
- SmartZone 6.1.2 or later
- AP Solo 118.2.0.0.875
Vendor Status
Vendor | Link |
CommScope, Inc. | Security Bulletin 20231128 |
References
JPCERT/CC Addendum
Vulnerability Analysis by JPCERT/CC
CVSS v3
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Base Score:
6.1
Attack Vector(AV) | Physical (P) | Local (L) | Adjacent (A) | Network (N) |
---|---|---|---|---|
Attack Complexity(AC) | High (H) | Low (L) | ||
Privileges Required(PR) | High (H) | Low (L) | None (N) | |
User Interaction(UI) | Required (R) | None (N) | ||
Scope(S) | Unchanged (U) | Changed (C) | ||
Confidentiality Impact(C) | None (N) | Low (L) | High (H) | |
Integrity Impact(I) | None (N) | Low (L) | High (H) | |
Availability Impact(A) | None (N) | Low (L) | High (H) |
CVSS v2
AV:N/AC:H/Au:N/C:N/I:P/A:N
Base Score:
2.6
Access Vector(AV) | Local (L) | Adjacent Network (A) | Network (N) |
---|---|---|---|
Access Complexity(AC) | High (H) | Medium (M) | Low (L) |
Authentication(Au) | Multiple (M) | Single (S) | None (N) |
Confidentiality Impact(C) | None (N) | Partial (P) | Complete (C) |
Integrity Impact(I) | None (N) | Partial (P) | Complete (C) |
Availability Impact(A) | None (N) | Partial (P) | Complete (C) |
Credit
MUNEHIRO SHIRATANI of AGEST,Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
Other Information
JPCERT Alert |
|
JPCERT Reports |
|
CERT Advisory |
|
CPNI Advisory |
|
TRnotes |
|
CVE |
CVE-2023-49225 |
JVN iPedia |
JVNDB-2023-000119 |