NA

CVE-2020-22654

Published: 20/01/2023 Updated: 30/01/2023
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 0

Vulnerability Summary

In Ruckus R310 10.5.1.0.199, Ruckus R500 10.5.1.0.199, Ruckus R600 10.5.1.0.199, Ruckus T300 10.5.1.0.199, Ruckus T301n 10.5.1.0.199, Ruckus T301s 10.5.1.0.199, SmartCell Gateway 200 (SCG200) prior to 3.6.2.0.795, SmartZone 100 (SZ-100) prior to 3.6.2.0.795, SmartZone 300 (SZ300) prior to 3.6.2.0.795, Virtual SmartZone (vSZ) prior to 3.6.2.0.795, ZoneDirector 1100 9.10.2.0.130, ZoneDirector 1200 10.2.1.0.218, ZoneDirector 3000 10.2.1.0.218, ZoneDirector 5000 10.0.1.0.151, a vulnerability allows malicious users to bypass firmware image bad md5 checksum failed error.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

ruckuswireless r310_firmware 10.5.1.0.199

ruckuswireless r500_firmware 10.5.1.0.199

ruckuswireless r600_firmware 10.5.1.0.199

ruckuswireless t300_firmware 10.5.1.0.199

ruckuswireless t301n_firmware 10.5.1.0.199

ruckuswireless t301s_firmware 10.5.1.0.199

ruckuswireless scg200_firmware

ruckuswireless sz-100_firmware

ruckuswireless sz-300_firmware

ruckuswireless vsz_firmware

ruckuswireless zonedirector_1100_firmware 9.10.2.0.130

ruckuswireless zonedirector_1200_firmware 10.2.1.0.218

ruckuswireless zonedirector_3000_firmware 10.2.1.0.218

ruckuswireless zonedirector_5000_firmware 10.0.1.0.151