FKIE_CVE-2020-22654
Vulnerability from fkie_nvd - Published: 2023-01-20 19:15 - Updated: 2025-04-03 18:15
Severity ?
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
In Ruckus R310 10.5.1.0.199, Ruckus R500 10.5.1.0.199, Ruckus R600 10.5.1.0.199, Ruckus T300 10.5.1.0.199, Ruckus T301n 10.5.1.0.199, Ruckus T301s 10.5.1.0.199, SmartCell Gateway 200 (SCG200) before 3.6.2.0.795, SmartZone 100 (SZ-100) before 3.6.2.0.795, SmartZone 300 (SZ300) before 3.6.2.0.795, Virtual SmartZone (vSZ) before 3.6.2.0.795, ZoneDirector 1100 9.10.2.0.130, ZoneDirector 1200 10.2.1.0.218, ZoneDirector 3000 10.2.1.0.218, ZoneDirector 5000 10.0.1.0.151, a vulnerability allows attackers to bypass firmware image bad md5 checksum failed error.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| ruckuswireless | r310_firmware | 10.5.1.0.199 | |
| ruckuswireless | r310 | - | |
| ruckuswireless | r500_firmware | 10.5.1.0.199 | |
| ruckuswireless | r500 | - | |
| ruckuswireless | r600_firmware | 10.5.1.0.199 | |
| ruckuswireless | r600 | - | |
| ruckuswireless | t300_firmware | 10.5.1.0.199 | |
| ruckuswireless | t300 | - | |
| ruckuswireless | t301n_firmware | 10.5.1.0.199 | |
| ruckuswireless | t301n | - | |
| ruckuswireless | t301s_firmware | 10.5.1.0.199 | |
| ruckuswireless | t301s | - | |
| ruckuswireless | scg200_firmware | * | |
| ruckuswireless | scg200 | - | |
| ruckuswireless | sz-100_firmware | * | |
| ruckuswireless | sz-100 | - | |
| ruckuswireless | sz-300_firmware | * | |
| ruckuswireless | sz-300 | - | |
| ruckuswireless | vsz_firmware | * | |
| ruckuswireless | vsz | - | |
| ruckuswireless | zonedirector_1100_firmware | 9.10.2.0.130 | |
| ruckuswireless | zonedirector_1100 | - | |
| ruckuswireless | zonedirector_1200_firmware | 10.2.1.0.218 | |
| ruckuswireless | zonedirector_1200 | - | |
| ruckuswireless | zonedirector_3000_firmware | 10.2.1.0.218 | |
| ruckuswireless | zonedirector_3000 | - | |
| ruckuswireless | zonedirector_5000_firmware | 10.0.1.0.151 | |
| ruckuswireless | zonedirector_5000 | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:ruckuswireless:r310_firmware:10.5.1.0.199:*:*:*:*:*:*:*",
"matchCriteriaId": "5ED8801F-2B0B-480D-876D-9F662B995851",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:ruckuswireless:r310:-:*:*:*:*:*:*:*",
"matchCriteriaId": "40D3129E-4C02-484F-96B6-59D76F787D21",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:ruckuswireless:r500_firmware:10.5.1.0.199:*:*:*:*:*:*:*",
"matchCriteriaId": "E54CB15F-CA79-403B-A1B1-B7832B65EEC3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:ruckuswireless:r500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9BBDBE9C-BE4B-4ED6-AF62-8FE484C519E2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:ruckuswireless:r600_firmware:10.5.1.0.199:*:*:*:*:*:*:*",
"matchCriteriaId": "27E05347-1CFD-46FC-999A-90E6C40CEE26",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:ruckuswireless:r600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5421B1D7-E630-4BDA-BA34-7DD8D0738DF4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:ruckuswireless:t300_firmware:10.5.1.0.199:*:*:*:*:*:*:*",
"matchCriteriaId": "5D91278C-B07E-44FF-ABBA-10E8B5830FFA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:ruckuswireless:t300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0511674E-59A6-427C-A265-B277D84DE301",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:ruckuswireless:t301n_firmware:10.5.1.0.199:*:*:*:*:*:*:*",
"matchCriteriaId": "E0412E29-6DB5-4C01-B8C3-702EB7EBE8DE",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:ruckuswireless:t301n:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EBB7A43E-F5F1-465A-841F-05214EDA6833",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:ruckuswireless:t301s_firmware:10.5.1.0.199:*:*:*:*:*:*:*",
"matchCriteriaId": "6DAA3771-2795-403D-8506-C155403C8B7C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:ruckuswireless:t301s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "68C4D9AC-5B1C-4066-8216-3F7127C3CC64",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:ruckuswireless:scg200_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "775F1067-344F-49AD-9901-97D2F1AC5F0F",
"versionEndExcluding": "3.6.2.0.795",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:ruckuswireless:scg200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E6FB3968-8D8A-4D04-B3D1-18A28CA8C249",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:ruckuswireless:sz-100_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "46BCF71C-8A66-45C8-B1ED-8957B670CBF5",
"versionEndExcluding": "3.6.2.0.795",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:ruckuswireless:sz-100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3B9F3E41-79CA-45B7-B799-B0A64E60BA16",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:ruckuswireless:sz-300_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7CEA2295-79BE-4728-8BF2-DEAB2BCAA0E5",
"versionEndExcluding": "3.6.2.0.795",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:ruckuswireless:sz-300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4087D2FB-0853-40AE-A03F-803B5972A404",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:ruckuswireless:vsz_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B3E5690D-7955-4E12-AE51-C3CDAD596096",
"versionEndExcluding": "3.6.2.0.795",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:ruckuswireless:vsz:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A1E9A46B-D8E4-489A-8648-28EDDF000E28",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:ruckuswireless:zonedirector_1100_firmware:9.10.2.0.130:*:*:*:*:*:*:*",
"matchCriteriaId": "76872953-AA21-41F1-832E-5CD04CA0FF9A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:ruckuswireless:zonedirector_1100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CF376AF6-E73A-425B-8E31-36330D8FEB73",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:ruckuswireless:zonedirector_1200_firmware:10.2.1.0.218:*:*:*:*:*:*:*",
"matchCriteriaId": "83AD20A3-C56E-4436-A9CC-29884EF9EB67",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:ruckuswireless:zonedirector_1200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0FE0C2B2-D14B-4798-95C4-F911B3B1D88E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:ruckuswireless:zonedirector_3000_firmware:10.2.1.0.218:*:*:*:*:*:*:*",
"matchCriteriaId": "86A26EBE-4077-4DE7-BC6C-D38F5A3D3E7B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:ruckuswireless:zonedirector_3000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5A1F42A8-8785-48A5-B0B0-68504EFD38B9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:ruckuswireless:zonedirector_5000_firmware:10.0.1.0.151:*:*:*:*:*:*:*",
"matchCriteriaId": "04D53E59-6431-4ED3-BA0B-E54B2FBCDE0D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:ruckuswireless:zonedirector_5000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1DA49DE5-DA7F-4531-9ACF-353561DA90E4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In Ruckus R310 10.5.1.0.199, Ruckus R500 10.5.1.0.199, Ruckus R600 10.5.1.0.199, Ruckus T300 10.5.1.0.199, Ruckus T301n 10.5.1.0.199, Ruckus T301s 10.5.1.0.199, SmartCell Gateway 200 (SCG200) before 3.6.2.0.795, SmartZone 100 (SZ-100) before 3.6.2.0.795, SmartZone 300 (SZ300) before 3.6.2.0.795, Virtual SmartZone (vSZ) before 3.6.2.0.795, ZoneDirector 1100 9.10.2.0.130, ZoneDirector 1200 10.2.1.0.218, ZoneDirector 3000 10.2.1.0.218, ZoneDirector 5000 10.0.1.0.151, a vulnerability allows attackers to bypass firmware image bad md5 checksum failed error."
},
{
"lang": "es",
"value": "En Ruckus R310 10.5.1.0.199, Ruckus R500 10.5.1.0.199, Ruckus R600 10.5.1.0.199, Ruckus T300 10.5.1.0.199, Ruckus T301n 10.5.1.0.199, Ruckus T301s 10.5.1.0 .199, SmartCell Gateway 200 (SCG200) anterior a 3.6.2.0.795, SmartZone 100 (SZ-100) anterior a 3.6.2.0.795, SmartZone 300 (SZ300) anterior a 3.6.2.0.795, Virtual SmartZone (vSZ) anterior a 3.6.2.0.795, ZoneDirector 1100 9.10.2.0.130, ZoneDirector 1200 10.2.1.0.218, ZoneDirector 3000 10.2.1.0.218, ZoneDirector 5000 10.0.1.0.151, una vulnerabilidad permite a los atacantes evitar el error de suma de comprobaci\u00f3n md5 incorrecta de la imagen del firmware."
}
],
"id": "CVE-2020-22654",
"lastModified": "2025-04-03T18:15:39.100",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2023-01-20T19:15:12.610",
"references": [
{
"source": "cve@mitre.org",
"url": "https://hdhrmi.blogspot.com/2020/03/multiple-vulnerabilities-in-ruckus.html?m=1"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://support.ruckuswireless.com/security_bulletins/302"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://support.ruckuswireless.com/security_bulletins/302"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-494"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…