NA

CVE-2020-22654

Published: 20/01/2023 Updated: 30/01/2023
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 0

Vulnerability Summary

In Ruckus R310 10.5.1.0.199, Ruckus R500 10.5.1.0.199, Ruckus R600 10.5.1.0.199, Ruckus T300 10.5.1.0.199, Ruckus T301n 10.5.1.0.199, Ruckus T301s 10.5.1.0.199, SmartCell Gateway 200 (SCG200) prior to 3.6.2.0.795, SmartZone 100 (SZ-100) prior to 3.6.2.0.795, SmartZone 300 (SZ300) prior to 3.6.2.0.795, Virtual SmartZone (vSZ) prior to 3.6.2.0.795, ZoneDirector 1100 9.10.2.0.130, ZoneDirector 1200 10.2.1.0.218, ZoneDirector 3000 10.2.1.0.218, ZoneDirector 5000 10.0.1.0.151, a vulnerability allows malicious users to bypass firmware image bad md5 checksum failed error.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

ruckuswireless r310 firmware 10.5.1.0.199

ruckuswireless r500 firmware 10.5.1.0.199

ruckuswireless r600 firmware 10.5.1.0.199

ruckuswireless t300 firmware 10.5.1.0.199

ruckuswireless t301n firmware 10.5.1.0.199

ruckuswireless t301s firmware 10.5.1.0.199

ruckuswireless scg200 firmware

ruckuswireless sz-100 firmware

ruckuswireless sz-300 firmware

ruckuswireless vsz firmware

ruckuswireless zonedirector 1100 firmware 9.10.2.0.130

ruckuswireless zonedirector 1200 firmware 10.2.1.0.218

ruckuswireless zonedirector 3000 firmware 10.2.1.0.218

ruckuswireless zonedirector 5000 firmware 10.0.1.0.151