CVE-2023-49225 (GCVE-0-2023-49225)
Vulnerability from cvelistv5 – Published: 2023-12-07 06:22 – Updated: 2025-05-28 13:58
VLAI?
Summary
A cross-site-scripting vulnerability exists in Ruckus Access Point products (ZoneDirector, SmartZone, and AP Solo). If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who is logging in the product. As for the affected products/models/versions, see the information provided by the vendor listed under [References] section or the list under [Product Status] section.
Severity ?
6.1 (Medium)
CWE
- Cross-site scripting (XSS)
Assigner
References
Impacted products
| Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| CommScope, Inc. | ZoneDirector |
Affected:
10.5.1 and earlier
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T21:53:45.350Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://support.ruckuswireless.com/security_bulletins/323"
},
{
"tags": [
"x_transferred"
],
"url": "https://jvn.jp/en/jp/JVN45891816/"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2023-49225",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-05-28T13:53:26.065683Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-79",
"description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-05-28T13:58:41.326Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "ZoneDirector",
"vendor": "CommScope, Inc.",
"versions": [
{
"status": "affected",
"version": "10.5.1 and earlier "
}
]
},
{
"product": "SmartZone",
"vendor": "CommScope, Inc.",
"versions": [
{
"status": "affected",
"version": "6.1.1 and earlier "
}
]
},
{
"product": "AP Solo R750",
"vendor": "CommScope, Inc.",
"versions": [
{
"status": "affected",
"version": "114.0.0.0.6565 and earlier "
}
]
},
{
"product": "AP Solo R650",
"vendor": "CommScope, Inc.",
"versions": [
{
"status": "affected",
"version": "114.0.0.0.6565 and earlier "
}
]
},
{
"product": "AP Solo R730",
"vendor": "CommScope, Inc.",
"versions": [
{
"status": "affected",
"version": "114.0.0.0.6565 and earlier "
}
]
},
{
"product": "AP Solo T750",
"vendor": "CommScope, Inc.",
"versions": [
{
"status": "affected",
"version": "114.0.0.0.6565 and earlier "
}
]
},
{
"product": "AP Solo R550",
"vendor": "CommScope, Inc.",
"versions": [
{
"status": "affected",
"version": "114.0.0.0.5585 and earlier "
}
]
},
{
"product": "AP Solo R850",
"vendor": "CommScope, Inc.",
"versions": [
{
"status": "affected",
"version": "114.0.0.0.5585 and earlier "
}
]
},
{
"product": "AP Solo T750SE",
"vendor": "CommScope, Inc.",
"versions": [
{
"status": "affected",
"version": "114.0.0.0.5585 and earlier "
}
]
},
{
"product": "AP Solo R510",
"vendor": "CommScope, Inc.",
"versions": [
{
"status": "affected",
"version": "114.0.0.0.6565 and earlier "
}
]
},
{
"product": "AP Solo T310D",
"vendor": "CommScope, Inc.",
"versions": [
{
"status": "affected",
"version": "114.0.0.0.6565 and earlier "
}
]
},
{
"product": "AP Solo E510",
"vendor": "CommScope, Inc.",
"versions": [
{
"status": "affected",
"version": "114.0.0.0.6565 and earlier "
}
]
},
{
"product": "AP Solo C110",
"vendor": "CommScope, Inc.",
"versions": [
{
"status": "affected",
"version": "114.0.0.0.6565 and earlier "
}
]
},
{
"product": "AP Solo R320",
"vendor": "CommScope, Inc.",
"versions": [
{
"status": "affected",
"version": "114.0.0.0.6565 and earlier "
}
]
},
{
"product": "AP Solo H510",
"vendor": "CommScope, Inc.",
"versions": [
{
"status": "affected",
"version": "114.0.0.0.6565 and earlier "
}
]
},
{
"product": "AP Solo H320",
"vendor": "CommScope, Inc.",
"versions": [
{
"status": "affected",
"version": "114.0.0.0.6565 and earlier "
}
]
},
{
"product": "AP Solo T310S",
"vendor": "CommScope, Inc.",
"versions": [
{
"status": "affected",
"version": "114.0.0.0.6565 and earlier "
}
]
},
{
"product": "AP Solo T310N",
"vendor": "CommScope, Inc.",
"versions": [
{
"status": "affected",
"version": "114.0.0.0.6565 and earlier "
}
]
},
{
"product": "AP Solo T310C",
"vendor": "CommScope, Inc.",
"versions": [
{
"status": "affected",
"version": "114.0.0.0.6565 and earlier "
}
]
},
{
"product": "AP Solo T305",
"vendor": "CommScope, Inc.",
"versions": [
{
"status": "affected",
"version": "114.0.0.0.6565 and earlier "
}
]
},
{
"product": "AP Solo M510",
"vendor": "CommScope, Inc.",
"versions": [
{
"status": "affected",
"version": "114.0.0.0.6565 and earlier "
}
]
},
{
"product": "AP Solo R720",
"vendor": "CommScope, Inc.",
"versions": [
{
"status": "affected",
"version": "114.0.0.0.6565 and earlier "
}
]
},
{
"product": "AP Solo R710",
"vendor": "CommScope, Inc.",
"versions": [
{
"status": "affected",
"version": "114.0.0.0.6565 and earlier "
}
]
},
{
"product": "AP Solo T710",
"vendor": "CommScope, Inc.",
"versions": [
{
"status": "affected",
"version": "114.0.0.0.6565 and earlier "
}
]
},
{
"product": "AP Solo T710s",
"vendor": "CommScope, Inc.",
"versions": [
{
"status": "affected",
"version": "114.0.0.0.6565 and earlier "
}
]
},
{
"product": "AP Solo T610",
"vendor": "CommScope, Inc.",
"versions": [
{
"status": "affected",
"version": "114.0.0.0.6565 and earlier "
}
]
},
{
"product": "AP Solo T610s",
"vendor": "CommScope, Inc.",
"versions": [
{
"status": "affected",
"version": "114.0.0.0.6565 and earlier "
}
]
},
{
"product": "AP Solo R610",
"vendor": "CommScope, Inc.",
"versions": [
{
"status": "affected",
"version": "114.0.0.0.6565 and earlier "
}
]
},
{
"product": "AP Solo R310",
"vendor": "CommScope, Inc.",
"versions": [
{
"status": "affected",
"version": "110.0.0.0.2014 and earlier "
}
]
},
{
"product": "AP Solo R760",
"vendor": "CommScope, Inc.",
"versions": [
{
"status": "affected",
"version": "118.1.0.0.1274 and earlier "
}
]
},
{
"product": "AP Solo R560",
"vendor": "CommScope, Inc.",
"versions": [
{
"status": "affected",
"version": "118.1.0.0.1908 and earlier "
}
]
},
{
"product": "AP Solo H550",
"vendor": "CommScope, Inc.",
"versions": [
{
"status": "affected",
"version": "116.0.0.0.1506 and earlier "
}
]
},
{
"product": "AP Solo H350",
"vendor": "CommScope, Inc.",
"versions": [
{
"status": "affected",
"version": "116.0.0.0.3128 and earlier "
}
]
},
{
"product": "AP Solo T350c",
"vendor": "CommScope, Inc.",
"versions": [
{
"status": "affected",
"version": "116.0.0.0.1543 and earlier "
}
]
},
{
"product": "AP Solo T350d",
"vendor": "CommScope, Inc.",
"versions": [
{
"status": "affected",
"version": "116.0.0.0.1543 and earlier "
}
]
},
{
"product": "AP Solo T350se",
"vendor": "CommScope, Inc.",
"versions": [
{
"status": "affected",
"version": "116.0.0.0.3136 and earlier "
}
]
},
{
"product": "AP Solo R350",
"vendor": "CommScope, Inc.",
"versions": [
{
"status": "affected",
"version": "116.0.0.0.1655 and earlier "
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A cross-site-scripting vulnerability exists in Ruckus Access Point products (ZoneDirector, SmartZone, and AP Solo). If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who is logging in the product. As for the affected products/models/versions, see the information provided by the vendor listed under [References] section or the list under [Product Status] section."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Cross-site scripting (XSS)",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-12-07T06:22:32.328Z",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"url": "https://support.ruckuswireless.com/security_bulletins/323"
},
{
"url": "https://jvn.jp/en/jp/JVN45891816/"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2023-49225",
"datePublished": "2023-12-07T06:22:32.328Z",
"dateReserved": "2023-11-24T00:19:52.591Z",
"dateUpdated": "2025-05-28T13:58:41.326Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:ruckuswireless:r750_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"114.0.0.0.6565\", \"matchCriteriaId\": \"19637FB4-A1EC-4DDB-9FD2-B176427B9933\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:ruckuswireless:r750:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BA49CB45-1196-4AD7-8AB6-C5593BBF015F\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:ruckuswireless:r650_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"114.0.0.0.6565\", \"matchCriteriaId\": \"2F805AE7-830E-4D88-AA80-40FEC783AC84\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:ruckuswireless:r650:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"951BDA12-0294-472A-9292-F60AC6D4292B\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:ruckuswireless:r730_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"114.0.0.0.6565\", \"matchCriteriaId\": \"4F98CC2D-247B-493F-A1DD-8133622C2AE7\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:ruckuswireless:r730:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BB28A5E0-6F42-4133-B1D3-1D0116079094\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:ruckuswireless:t750_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"114.0.0.0.6565\", \"matchCriteriaId\": \"DFCDC4FB-7448-4E19-AF4D-897180F3775B\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:ruckuswireless:t750:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5C15AA25-82B2-4C02-8361-E8F6179B525A\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:ruckuswireless:r510_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"114.0.0.0.6565\", \"matchCriteriaId\": \"5D6269F0-AFA6-48A9-92D2-3A3250B1E6C0\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:ruckuswireless:r510:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"80B2E8CC-EACE-4A80-9EB1-DADAB8034415\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:ruckuswireless:e510_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"114.0.0.0.6565\", \"matchCriteriaId\": \"2D2FB77C-1E97-44C5-A961-7F91B1A8AB34\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:ruckuswireless:e510:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FBF5C92C-C889-4732-BB00-E6D55613E410\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:ruckuswireless:c110_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"114.0.0.0.6565\", \"matchCriteriaId\": \"6531A85F-9AA8-4A26-9A81-09003B8AAF2E\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:ruckuswireless:c110:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A77671DB-6197-4C8D-B667-A0081350E5AF\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:ruckuswireless:r320_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"114.0.0.0.6565\", \"matchCriteriaId\": \"7C00DA68-6EA2-4D88-B60C-6980D4953912\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:ruckuswireless:r320:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"93CE3224-85D2-4039-8F24-BB503DFD42C2\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:ruckuswireless:h510_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"114.0.0.0.6565\", \"matchCriteriaId\": \"843E61F5-DE53-47B3-BF24-B817BE9F334E\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:ruckuswireless:h510:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CB1FAB48-786A-4FB3-AB6D-3118E94E68C7\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:ruckuswireless:h320_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"114.0.0.0.6565\", \"matchCriteriaId\": \"F625B309-F3BC-4899-B6B4-C460B7502730\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:ruckuswireless:h320:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"282C3A1D-711C-4415-B9BE-A9B518204AEB\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:ruckuswireless:t305_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"114.0.0.0.6565\", \"matchCriteriaId\": \"2ED5CB06-9A07-4EF6-B730-7D24B8E131F7\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:ruckuswireless:t305:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0500E6E8-D56C-41EC-B9C5-72C5DD955639\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:ruckuswireless:m510_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"114.0.0.0.6565\", \"matchCriteriaId\": \"3EB3F18F-04F1-4D37-A74C-B12ED64ECDEE\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:ruckuswireless:m510:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D4AE7200-4090-4B81-A22F-B8553A014D21\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:ruckuswireless:r720_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"114.0.0.0.6565\", \"matchCriteriaId\": \"73590841-C0E4-423B-89F3-C5E3E5DC3A84\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:ruckuswireless:r720:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DDFDAF0A-9F5D-4E34-805E-6F27103AAA32\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:ruckuswireless:r710_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"114.0.0.0.6565\", \"matchCriteriaId\": \"CD213C0E-8D62-43C1-AAAD-72AB2455F4C8\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:ruckuswireless:r710:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E95884E9-C6AF-4106-A178-9274AD27EF65\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:ruckuswireless:t710_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"114.0.0.0.6565\", \"matchCriteriaId\": \"1AC75B29-992F-4917-B0A9-6B4C16905E3A\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:ruckuswireless:t710:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A40B9489-D999-4355-953E-36A7F8DEF299\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:ruckuswireless:t610_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"114.0.0.0.6565\", \"matchCriteriaId\": \"0273FF13-6329-4A68-B2B1-674D0FDCEACC\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:ruckuswireless:t610:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"210D55AB-9305-4D0B-B9F0-47889D37373B\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:ruckuswireless:r610_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"114.0.0.0.6565\", \"matchCriteriaId\": \"7CA61CD3-AFD8-4C9B-B707-850A352EFF63\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:ruckuswireless:r610:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4244947C-538E-4B83-B4F4-3DD4F3C22E83\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:ruckuswireless:t310d_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"114.0.0.0.6565\", \"matchCriteriaId\": \"3D3D9629-CDD0-497E-A798-BD68696D7B0A\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:ruckuswireless:t310d:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C2D3E8C6-4676-4B74-A252-132A26670C64\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:ruckuswireless:t310s_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"114.0.0.0.6565\", \"matchCriteriaId\": \"47656F30-691A-4072-B5DF-0B4026133B24\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:ruckuswireless:t310s:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"72378D4B-ADB5-4DE5-BB92-1778BDFD61FC\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:ruckuswireless:t310n_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"114.0.0.0.6565\", \"matchCriteriaId\": \"8508F154-5538-401A-8A1E-192C38A482B4\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:ruckuswireless:t310n:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2ED4C9B4-7F70-4059-8592-FD3F034160C3\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:ruckuswireless:t310c_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"114.0.0.0.6565\", \"matchCriteriaId\": \"D50969FD-837B-49B3-820E-E02CA9CD75E3\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:ruckuswireless:t310c:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BFB69C4E-2B4F-4F61-8A65-9BA0354F33E3\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:ruckuswireless:t710s_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"114.0.0.0.6565\", \"matchCriteriaId\": \"11907B93-2CC9-43E7-98E9-B13370225009\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:ruckuswireless:t710s:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4CFF0772-D853-4781-B326-E3BDEAC78EE0\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:ruckuswireless:t610s_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"114.0.0.0.6565\", \"matchCriteriaId\": \"A6B8C9F8-76A1-4B8C-8FB9-770CB0E7DC94\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:ruckuswireless:t610s:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"752CBB38-F5C6-4666-B062-B5E3B15CA1A0\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:ruckuswireless:r550_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"114.0.0.0.5585\", \"matchCriteriaId\": \"260442D7-362E-4141-BE55-066154A5B587\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:ruckuswireless:r550:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"215024F9-C68E-4919-9FD5-215CF900A830\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:ruckuswireless:r850_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"114.0.0.0.5585\", \"matchCriteriaId\": \"392561BB-1413-44A3-B4D1-CC4A57DC67F1\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:ruckuswireless:r850:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3A244DE5-A9B3-45BE-8AD1-154546F4F1F4\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:ruckuswireless:t750se_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"114.0.0.0.5585\", \"matchCriteriaId\": \"0F079E97-F62E-4919-A21B-1443146FEB14\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:ruckuswireless:t750se:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9E1DE3AD-CA13-44CE-ACF1-3DE2D6C691BC\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:ruckuswireless:r310_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"110.0.0.0.2014\", \"matchCriteriaId\": \"0F6AF187-4EC5-4F8A-9FB3-E1FD4F71FA4F\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:ruckuswireless:r310:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"93655935-481F-477B-A0C3-EFFFB822C9D5\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:ruckuswireless:r760_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"118.1.0.0.1274\", \"matchCriteriaId\": \"22D73A1E-302B-4494-B0CF-48D298A25916\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:ruckuswireless:r760:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"700D0FAA-0964-486A-932B-08CF1A328468\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:ruckuswireless:r760_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"118.1.0.0.1274\", \"matchCriteriaId\": \"22D73A1E-302B-4494-B0CF-48D298A25916\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:ruckuswireless:r760:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"700D0FAA-0964-486A-932B-08CF1A328468\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:ruckuswireless:r560_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"118.1.0.0.1908\", \"matchCriteriaId\": \"1BEFF83F-4F8E-4BFE-B964-2F019A846EF0\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:ruckuswireless:r560:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"75E00EC7-030F-4E90-8747-4AA87C2DA73D\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:ruckuswireless:h550_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"116.0.0.0.1506\", \"matchCriteriaId\": \"DFDDACE4-B572-4E7F-8D7C-333B3108D0F8\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:ruckuswireless:h550:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"843E2FCE-C3EC-406A-8ECB-BA5F51C2DCFF\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:ruckuswireless:h350_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"116.0.0.0.3128\", \"matchCriteriaId\": \"F1056C4F-1A29-474A-AD6F-6911F68ED36E\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:ruckuswireless:h350:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"389825B3-BD3F-48F9-A6EB-238D1485E24D\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:ruckuswireless:t350c_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"116.0.0.0.1543\", \"matchCriteriaId\": \"561DDAE6-C5A0-4DA8-AC07-0EF7D06A8848\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:ruckuswireless:t350c:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"663BF055-A677-418A-8009-599D7BE04221\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:ruckuswireless:t350d_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"116.0.0.0.1543\", \"matchCriteriaId\": \"C77FF583-1BAF-4042-A5F0-07DF1FC4C5E4\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:ruckuswireless:t350d:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4323CCB1-EE5E-498F-86F3-00CE6C75F10D\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:ruckuswireless:t350se_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"116.0.0.0.3136\", \"matchCriteriaId\": \"BCC95847-0984-466D-9227-5A44971260F2\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:ruckuswireless:t350se:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"60A48D4A-75D9-486B-896D-7BF11AD3ED6B\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:ruckuswireless:r350_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"116.0.0.0.1655\", \"matchCriteriaId\": \"004DED59-2353-40D5-997A-E021728E4F23\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:ruckuswireless:r350:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"34B3B5B6-3365-47B2-847E-004489533CDA\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:ruckuswireless:smartzone_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"6.1.1\", \"matchCriteriaId\": \"6E0D700D-F65B-49CC-BA09-41B22A6884C1\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:ruckuswireless:smartzone:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"488EBBAE-099D-4448-AAE6-823C448C4DD6\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:ruckuswireless:zonedirector_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"10.5.1\", \"matchCriteriaId\": \"E1DA133A-1251-4946-BC27-FECABFEA056A\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:ruckuswireless:zonedirector:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BC847897-E9C7-4247-BC22-E999847E1110\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"A cross-site-scripting vulnerability exists in Ruckus Access Point products (ZoneDirector, SmartZone, and AP Solo). If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who is logging in the product. As for the affected products/models/versions, see the information provided by the vendor listed under [References] section or the list under [Product Status] section.\"}, {\"lang\": \"es\", \"value\": \"Existe una vulnerabilidad de Cross-Site-Scripting en los productos Ruckus Access Point (ZoneDirector, SmartZone y AP Solo). Si se explota esta vulnerabilidad, se puede ejecutar un script arbitrario en el navegador web del usuario que inicia sesi\\u00f3n en el producto. En cuanto a los productos/modelos/versiones afectados, consulte la informaci\\u00f3n proporcionada por el proveedor que figura en la secci\\u00f3n [Referencias] o la lista en la secci\\u00f3n [Estado del producto].\"}]",
"id": "CVE-2023-49225",
"lastModified": "2024-11-21T08:33:03.617",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\", \"baseScore\": 6.1, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"LOW\", \"integrityImpact\": \"LOW\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 2.7}]}",
"published": "2023-12-07T07:15:12.880",
"references": "[{\"url\": \"https://jvn.jp/en/jp/JVN45891816/\", \"source\": \"vultures@jpcert.or.jp\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://support.ruckuswireless.com/security_bulletins/323\", \"source\": \"vultures@jpcert.or.jp\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"https://jvn.jp/en/jp/JVN45891816/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://support.ruckuswireless.com/security_bulletins/323\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}]",
"sourceIdentifier": "vultures@jpcert.or.jp",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-79\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2023-49225\",\"sourceIdentifier\":\"vultures@jpcert.or.jp\",\"published\":\"2023-12-07T07:15:12.880\",\"lastModified\":\"2025-08-22T21:09:15.577\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A cross-site-scripting vulnerability exists in Ruckus Access Point products (ZoneDirector, SmartZone, and AP Solo). If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who is logging in the product. As for the affected products/models/versions, see the information provided by the vendor listed under [References] section or the list under [Product Status] section.\"},{\"lang\":\"es\",\"value\":\"Existe una vulnerabilidad de Cross-Site-Scripting en los productos Ruckus Access Point (ZoneDirector, SmartZone y AP Solo). Si se explota esta vulnerabilidad, se puede ejecutar un script arbitrario en el navegador web del usuario que inicia sesi\u00f3n en el producto. En cuanto a los productos/modelos/versiones afectados, consulte la informaci\u00f3n proporcionada por el proveedor que figura en la secci\u00f3n [Referencias] o la lista en la secci\u00f3n [Estado del producto].\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\",\"baseScore\":6.1,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":2.7},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\",\"baseScore\":6.1,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":2.7}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ruckuswireless:r750_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"114.0.0.0.6565\",\"matchCriteriaId\":\"19637FB4-A1EC-4DDB-9FD2-B176427B9933\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ruckuswireless:r750:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA49CB45-1196-4AD7-8AB6-C5593BBF015F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ruckuswireless:r650_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"114.0.0.0.6565\",\"matchCriteriaId\":\"2F805AE7-830E-4D88-AA80-40FEC783AC84\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ruckuswireless:r650:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"951BDA12-0294-472A-9292-F60AC6D4292B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ruckuswireless:r730_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"114.0.0.0.6565\",\"matchCriteriaId\":\"4F98CC2D-247B-493F-A1DD-8133622C2AE7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ruckuswireless:r730:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB28A5E0-6F42-4133-B1D3-1D0116079094\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ruckuswireless:t750_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"114.0.0.0.6565\",\"matchCriteriaId\":\"DFCDC4FB-7448-4E19-AF4D-897180F3775B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ruckuswireless:t750:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C15AA25-82B2-4C02-8361-E8F6179B525A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ruckuswireless:r510_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"114.0.0.0.6565\",\"matchCriteriaId\":\"5D6269F0-AFA6-48A9-92D2-3A3250B1E6C0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ruckuswireless:r510:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80B2E8CC-EACE-4A80-9EB1-DADAB8034415\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ruckuswireless:e510_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"114.0.0.0.6565\",\"matchCriteriaId\":\"2D2FB77C-1E97-44C5-A961-7F91B1A8AB34\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ruckuswireless:e510:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FBF5C92C-C889-4732-BB00-E6D55613E410\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ruckuswireless:c110_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"114.0.0.0.6565\",\"matchCriteriaId\":\"6531A85F-9AA8-4A26-9A81-09003B8AAF2E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ruckuswireless:c110:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A77671DB-6197-4C8D-B667-A0081350E5AF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ruckuswireless:r320_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"114.0.0.0.6565\",\"matchCriteriaId\":\"7C00DA68-6EA2-4D88-B60C-6980D4953912\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ruckuswireless:r320:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"93CE3224-85D2-4039-8F24-BB503DFD42C2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ruckuswireless:h510_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"114.0.0.0.6565\",\"matchCriteriaId\":\"843E61F5-DE53-47B3-BF24-B817BE9F334E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ruckuswireless:h510:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB1FAB48-786A-4FB3-AB6D-3118E94E68C7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ruckuswireless:h320_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"114.0.0.0.6565\",\"matchCriteriaId\":\"F625B309-F3BC-4899-B6B4-C460B7502730\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ruckuswireless:h320:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"282C3A1D-711C-4415-B9BE-A9B518204AEB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ruckuswireless:t305_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"114.0.0.0.6565\",\"matchCriteriaId\":\"2ED5CB06-9A07-4EF6-B730-7D24B8E131F7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ruckuswireless:t305:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0500E6E8-D56C-41EC-B9C5-72C5DD955639\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ruckuswireless:m510_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"114.0.0.0.6565\",\"matchCriteriaId\":\"3EB3F18F-04F1-4D37-A74C-B12ED64ECDEE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ruckuswireless:m510:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4AE7200-4090-4B81-A22F-B8553A014D21\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ruckuswireless:r720_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"114.0.0.0.6565\",\"matchCriteriaId\":\"73590841-C0E4-423B-89F3-C5E3E5DC3A84\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ruckuswireless:r720:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DDFDAF0A-9F5D-4E34-805E-6F27103AAA32\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ruckuswireless:r710_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"114.0.0.0.6565\",\"matchCriteriaId\":\"CD213C0E-8D62-43C1-AAAD-72AB2455F4C8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ruckuswireless:r710:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E95884E9-C6AF-4106-A178-9274AD27EF65\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ruckuswireless:t710_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"114.0.0.0.6565\",\"matchCriteriaId\":\"1AC75B29-992F-4917-B0A9-6B4C16905E3A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ruckuswireless:t710:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A40B9489-D999-4355-953E-36A7F8DEF299\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ruckuswireless:t610_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"114.0.0.0.6565\",\"matchCriteriaId\":\"0273FF13-6329-4A68-B2B1-674D0FDCEACC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ruckuswireless:t610:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"210D55AB-9305-4D0B-B9F0-47889D37373B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ruckuswireless:r610_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"114.0.0.0.6565\",\"matchCriteriaId\":\"7CA61CD3-AFD8-4C9B-B707-850A352EFF63\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ruckuswireless:r610:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4244947C-538E-4B83-B4F4-3DD4F3C22E83\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ruckuswireless:t310d_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"114.0.0.0.6565\",\"matchCriteriaId\":\"3D3D9629-CDD0-497E-A798-BD68696D7B0A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ruckuswireless:t310d:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2D3E8C6-4676-4B74-A252-132A26670C64\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ruckuswireless:t310s_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"114.0.0.0.6565\",\"matchCriteriaId\":\"47656F30-691A-4072-B5DF-0B4026133B24\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ruckuswireless:t310s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"72378D4B-ADB5-4DE5-BB92-1778BDFD61FC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ruckuswireless:t310n_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"114.0.0.0.6565\",\"matchCriteriaId\":\"8508F154-5538-401A-8A1E-192C38A482B4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ruckuswireless:t310n:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2ED4C9B4-7F70-4059-8592-FD3F034160C3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ruckuswireless:t310c_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"114.0.0.0.6565\",\"matchCriteriaId\":\"D50969FD-837B-49B3-820E-E02CA9CD75E3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ruckuswireless:t310c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BFB69C4E-2B4F-4F61-8A65-9BA0354F33E3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ruckuswireless:t710s_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"114.0.0.0.6565\",\"matchCriteriaId\":\"11907B93-2CC9-43E7-98E9-B13370225009\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ruckuswireless:t710s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CFF0772-D853-4781-B326-E3BDEAC78EE0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ruckuswireless:t610s_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"114.0.0.0.6565\",\"matchCriteriaId\":\"A6B8C9F8-76A1-4B8C-8FB9-770CB0E7DC94\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ruckuswireless:t610s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"752CBB38-F5C6-4666-B062-B5E3B15CA1A0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ruckuswireless:r550_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"114.0.0.0.5585\",\"matchCriteriaId\":\"260442D7-362E-4141-BE55-066154A5B587\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ruckuswireless:r550:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"215024F9-C68E-4919-9FD5-215CF900A830\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ruckuswireless:r850_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"114.0.0.0.5585\",\"matchCriteriaId\":\"392561BB-1413-44A3-B4D1-CC4A57DC67F1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ruckuswireless:r850:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A244DE5-A9B3-45BE-8AD1-154546F4F1F4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ruckuswireless:t750se_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"114.0.0.0.5585\",\"matchCriteriaId\":\"0F079E97-F62E-4919-A21B-1443146FEB14\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ruckuswireless:t750se:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E1DE3AD-CA13-44CE-ACF1-3DE2D6C691BC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ruckuswireless:r310_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"110.0.0.0.2014\",\"matchCriteriaId\":\"0F6AF187-4EC5-4F8A-9FB3-E1FD4F71FA4F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ruckuswireless:r310:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"93655935-481F-477B-A0C3-EFFFB822C9D5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ruckuswireless:r760_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"118.1.0.0.1274\",\"matchCriteriaId\":\"22D73A1E-302B-4494-B0CF-48D298A25916\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ruckuswireless:r760:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"700D0FAA-0964-486A-932B-08CF1A328468\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ruckuswireless:r760_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"118.1.0.0.1274\",\"matchCriteriaId\":\"22D73A1E-302B-4494-B0CF-48D298A25916\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ruckuswireless:r760:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"700D0FAA-0964-486A-932B-08CF1A328468\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ruckuswireless:r560_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"118.1.0.0.1908\",\"matchCriteriaId\":\"1BEFF83F-4F8E-4BFE-B964-2F019A846EF0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ruckuswireless:r560:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"75E00EC7-030F-4E90-8747-4AA87C2DA73D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ruckuswireless:h550_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"116.0.0.0.1506\",\"matchCriteriaId\":\"DFDDACE4-B572-4E7F-8D7C-333B3108D0F8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ruckuswireless:h550:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"843E2FCE-C3EC-406A-8ECB-BA5F51C2DCFF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ruckuswireless:h350_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"116.0.0.0.3128\",\"matchCriteriaId\":\"F1056C4F-1A29-474A-AD6F-6911F68ED36E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ruckuswireless:h350:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"389825B3-BD3F-48F9-A6EB-238D1485E24D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ruckuswireless:t350c_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"116.0.0.0.1543\",\"matchCriteriaId\":\"561DDAE6-C5A0-4DA8-AC07-0EF7D06A8848\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ruckuswireless:t350c:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"663BF055-A677-418A-8009-599D7BE04221\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ruckuswireless:t350d_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"116.0.0.0.1543\",\"matchCriteriaId\":\"C77FF583-1BAF-4042-A5F0-07DF1FC4C5E4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ruckuswireless:t350d:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4323CCB1-EE5E-498F-86F3-00CE6C75F10D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ruckuswireless:t350se_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"116.0.0.0.3136\",\"matchCriteriaId\":\"BCC95847-0984-466D-9227-5A44971260F2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ruckuswireless:t350se:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"60A48D4A-75D9-486B-896D-7BF11AD3ED6B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ruckuswireless:r350_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"116.0.0.0.1655\",\"matchCriteriaId\":\"004DED59-2353-40D5-997A-E021728E4F23\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ruckuswireless:r350:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"34B3B5B6-3365-47B2-847E-004489533CDA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ruckuswireless:smartzone_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"6.1.1\",\"matchCriteriaId\":\"6E0D700D-F65B-49CC-BA09-41B22A6884C1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:commscope:ruckus_smartzone:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"92A4B5B7-E8A5-4FE1-8947-7BA90A37516A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ruckuswireless:zonedirector_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"10.5.1\",\"matchCriteriaId\":\"E1DA133A-1251-4946-BC27-FECABFEA056A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ruckuswireless:zonedirector:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC847897-E9C7-4247-BC22-E999847E1110\"}]}]}],\"references\":[{\"url\":\"https://jvn.jp/en/jp/JVN45891816/\",\"source\":\"vultures@jpcert.or.jp\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.ruckuswireless.com/security_bulletins/323\",\"source\":\"vultures@jpcert.or.jp\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://jvn.jp/en/jp/JVN45891816/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.ruckuswireless.com/security_bulletins/323\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://support.ruckuswireless.com/security_bulletins/323\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://jvn.jp/en/jp/JVN45891816/\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T21:53:45.350Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"CHANGED\", \"version\": \"3.1\", \"baseScore\": 6.1, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\", \"integrityImpact\": \"LOW\", \"userInteraction\": \"REQUIRED\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"LOW\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-49225\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-05-28T13:53:26.065683Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-79\", \"description\": \"CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-05-28T13:54:36.608Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"CommScope, Inc.\", \"product\": \"ZoneDirector\", \"versions\": [{\"status\": \"affected\", \"version\": \"10.5.1 and earlier \"}]}, {\"vendor\": \"CommScope, Inc.\", \"product\": \"SmartZone\", \"versions\": [{\"status\": \"affected\", \"version\": \"6.1.1 and earlier \"}]}, {\"vendor\": \"CommScope, Inc.\", \"product\": \"AP Solo R750\", \"versions\": [{\"status\": \"affected\", \"version\": \"114.0.0.0.6565 and earlier \"}]}, {\"vendor\": \"CommScope, Inc.\", \"product\": \"AP Solo R650\", \"versions\": [{\"status\": \"affected\", \"version\": \"114.0.0.0.6565 and earlier \"}]}, {\"vendor\": \"CommScope, Inc.\", \"product\": \"AP Solo R730\", \"versions\": [{\"status\": \"affected\", \"version\": \"114.0.0.0.6565 and earlier \"}]}, {\"vendor\": \"CommScope, Inc.\", \"product\": \"AP Solo T750\", \"versions\": [{\"status\": \"affected\", \"version\": \"114.0.0.0.6565 and earlier \"}]}, {\"vendor\": \"CommScope, Inc.\", \"product\": \"AP Solo R550\", \"versions\": [{\"status\": \"affected\", \"version\": \"114.0.0.0.5585 and earlier \"}]}, {\"vendor\": \"CommScope, Inc.\", \"product\": \"AP Solo R850\", \"versions\": [{\"status\": \"affected\", \"version\": \"114.0.0.0.5585 and earlier \"}]}, {\"vendor\": \"CommScope, Inc.\", \"product\": \"AP Solo T750SE\", \"versions\": [{\"status\": \"affected\", \"version\": \"114.0.0.0.5585 and earlier \"}]}, {\"vendor\": \"CommScope, Inc.\", \"product\": \"AP Solo R510\", \"versions\": [{\"status\": \"affected\", \"version\": \"114.0.0.0.6565 and earlier \"}]}, {\"vendor\": \"CommScope, Inc.\", \"product\": \"AP Solo T310D\", \"versions\": [{\"status\": \"affected\", \"version\": \"114.0.0.0.6565 and earlier \"}]}, {\"vendor\": \"CommScope, Inc.\", \"product\": \"AP Solo E510\", \"versions\": [{\"status\": \"affected\", \"version\": \"114.0.0.0.6565 and earlier \"}]}, {\"vendor\": \"CommScope, Inc.\", \"product\": \"AP Solo C110\", \"versions\": [{\"status\": \"affected\", \"version\": \"114.0.0.0.6565 and earlier \"}]}, {\"vendor\": \"CommScope, Inc.\", \"product\": \"AP Solo R320\", \"versions\": [{\"status\": \"affected\", \"version\": \"114.0.0.0.6565 and earlier \"}]}, {\"vendor\": \"CommScope, Inc.\", \"product\": \"AP Solo H510\", \"versions\": [{\"status\": \"affected\", \"version\": \"114.0.0.0.6565 and earlier \"}]}, {\"vendor\": \"CommScope, Inc.\", \"product\": \"AP Solo H320\", \"versions\": [{\"status\": \"affected\", \"version\": \"114.0.0.0.6565 and earlier \"}]}, {\"vendor\": \"CommScope, Inc.\", \"product\": \"AP Solo T310S\", \"versions\": [{\"status\": \"affected\", \"version\": \"114.0.0.0.6565 and earlier \"}]}, {\"vendor\": \"CommScope, Inc.\", \"product\": \"AP Solo T310N\", \"versions\": [{\"status\": \"affected\", \"version\": \"114.0.0.0.6565 and earlier \"}]}, {\"vendor\": \"CommScope, Inc.\", \"product\": \"AP Solo T310C\", \"versions\": [{\"status\": \"affected\", \"version\": \"114.0.0.0.6565 and earlier \"}]}, {\"vendor\": \"CommScope, Inc.\", \"product\": \"AP Solo T305\", \"versions\": [{\"status\": \"affected\", \"version\": \"114.0.0.0.6565 and earlier \"}]}, {\"vendor\": \"CommScope, Inc.\", \"product\": \"AP Solo M510\", \"versions\": [{\"status\": \"affected\", \"version\": \"114.0.0.0.6565 and earlier \"}]}, {\"vendor\": \"CommScope, Inc.\", \"product\": \"AP Solo R720\", \"versions\": [{\"status\": \"affected\", \"version\": \"114.0.0.0.6565 and earlier \"}]}, {\"vendor\": \"CommScope, Inc.\", \"product\": \"AP Solo R710\", \"versions\": [{\"status\": \"affected\", \"version\": \"114.0.0.0.6565 and earlier \"}]}, {\"vendor\": \"CommScope, Inc.\", \"product\": \"AP Solo T710\", \"versions\": [{\"status\": \"affected\", \"version\": \"114.0.0.0.6565 and earlier \"}]}, {\"vendor\": \"CommScope, Inc.\", \"product\": \"AP Solo T710s\", \"versions\": [{\"status\": \"affected\", \"version\": \"114.0.0.0.6565 and earlier \"}]}, {\"vendor\": \"CommScope, Inc.\", \"product\": \"AP Solo T610\", \"versions\": [{\"status\": \"affected\", \"version\": \"114.0.0.0.6565 and earlier \"}]}, {\"vendor\": \"CommScope, Inc.\", \"product\": \"AP Solo T610s\", \"versions\": [{\"status\": \"affected\", \"version\": \"114.0.0.0.6565 and earlier \"}]}, {\"vendor\": \"CommScope, Inc.\", \"product\": \"AP Solo R610\", \"versions\": [{\"status\": \"affected\", \"version\": \"114.0.0.0.6565 and earlier \"}]}, {\"vendor\": \"CommScope, Inc.\", \"product\": \"AP Solo R310\", \"versions\": [{\"status\": \"affected\", \"version\": \"110.0.0.0.2014 and earlier \"}]}, {\"vendor\": \"CommScope, Inc.\", \"product\": \"AP Solo R760\", \"versions\": [{\"status\": \"affected\", \"version\": \"118.1.0.0.1274 and earlier \"}]}, {\"vendor\": \"CommScope, Inc.\", \"product\": \"AP Solo R560\", \"versions\": [{\"status\": \"affected\", \"version\": \"118.1.0.0.1908 and earlier \"}]}, {\"vendor\": \"CommScope, Inc.\", \"product\": \"AP Solo H550\", \"versions\": [{\"status\": \"affected\", \"version\": \"116.0.0.0.1506 and earlier \"}]}, {\"vendor\": \"CommScope, Inc.\", \"product\": \"AP Solo H350\", \"versions\": [{\"status\": \"affected\", \"version\": \"116.0.0.0.3128 and earlier \"}]}, {\"vendor\": \"CommScope, Inc.\", \"product\": \"AP Solo T350c\", \"versions\": [{\"status\": \"affected\", \"version\": \"116.0.0.0.1543 and earlier \"}]}, {\"vendor\": \"CommScope, Inc.\", \"product\": \"AP Solo T350d\", \"versions\": [{\"status\": \"affected\", \"version\": \"116.0.0.0.1543 and earlier \"}]}, {\"vendor\": \"CommScope, Inc.\", \"product\": \"AP Solo T350se\", \"versions\": [{\"status\": \"affected\", \"version\": \"116.0.0.0.3136 and earlier \"}]}, {\"vendor\": \"CommScope, Inc.\", \"product\": \"AP Solo R350\", \"versions\": [{\"status\": \"affected\", \"version\": \"116.0.0.0.1655 and earlier \"}]}], \"references\": [{\"url\": \"https://support.ruckuswireless.com/security_bulletins/323\"}, {\"url\": \"https://jvn.jp/en/jp/JVN45891816/\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"A cross-site-scripting vulnerability exists in Ruckus Access Point products (ZoneDirector, SmartZone, and AP Solo). If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who is logging in the product. As for the affected products/models/versions, see the information provided by the vendor listed under [References] section or the list under [Product Status] section.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"text\", \"description\": \"Cross-site scripting (XSS)\"}]}], \"providerMetadata\": {\"orgId\": \"ede6fdc4-6654-4307-a26d-3331c018e2ce\", \"shortName\": \"jpcert\", \"dateUpdated\": \"2023-12-07T06:22:32.328Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2023-49225\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-05-28T13:58:41.326Z\", \"dateReserved\": \"2023-11-24T00:19:52.591Z\", \"assignerOrgId\": \"ede6fdc4-6654-4307-a26d-3331c018e2ce\", \"datePublished\": \"2023-12-07T06:22:32.328Z\", \"assignerShortName\": \"jpcert\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…