In Ruckus R310 10.5.1.0.199, Ruckus R500 10.5.1.0.199, Ruckus R600 10.5.1.0.199, Ruckus T300 10.5.1.0.199, Ruckus T301n 10.5.1.0.199, Ruckus T301s 10.5.1.0.199, SmartCell Gateway 200 (SCG200) prior to 3.6.2.0.795, SmartZone 100 (SZ-100) prior to 3.6.2.0.795, SmartZone 300 (SZ300) prior to 3.6.2.0.795, Virtual SmartZone (vSZ) prior to 3.6.2.0.795, ZoneDirector 1100 9.10.2.0.130, ZoneDirector 1200 10.2.1.0.218, ZoneDirector 3000 10.2.1.0.218, ZoneDirector 5000 10.0.1.0.151, a vulnerability allows malicious users to exploit the official image signature to force injection unauthorized image signature.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
ruckuswireless r310 firmware 10.5.1.0.199 |
||
ruckuswireless r500 firmware 10.5.1.0.199 |
||
ruckuswireless r600 firmware 10.5.1.0.199 |
||
ruckuswireless t300 firmware 10.5.1.0.199 |
||
ruckuswireless t301n firmware 10.5.1.0.199 |
||
ruckuswireless t301s firmware 10.5.1.0.199 |
||
ruckuswireless scg200 firmware |
||
ruckuswireless sz-100 firmware |
||
ruckuswireless sz-300 firmware |
||
ruckuswireless vsz firmware |
||
ruckuswireless zonedirector 1100 firmware 9.10.2.0.130 |
||
ruckuswireless zonedirector 1200 firmware 10.2.1.0.218 |
||
ruckuswireless zonedirector 3000 firmware 10.2.1.0.218 |
||
ruckuswireless zonedirector 5000 firmware 10.0.1.0.151 |