In Ruckus R310 10.5.1.0.199, Ruckus R500 10.5.1.0.199, Ruckus R600 10.5.1.0.199, Ruckus T300 10.5.1.0.199, Ruckus T301n 10.5.1.0.199, Ruckus T301s 10.5.1.0.199, SmartCell Gateway 200 (SCG200) prior to 3.6.2.0.795, SmartZone 100 (SZ-100) prior to 3.6.2.0.795, SmartZone 300 (SZ300) prior to 3.6.2.0.795, Virtual SmartZone (vSZ) prior to 3.6.2.0.795, ZoneDirector 1100 9.10.2.0.130, ZoneDirector 1200 10.2.1.0.218, ZoneDirector 3000 10.2.1.0.218, ZoneDirector 5000 10.0.1.0.151, a vulnerability allows malicious users to force bypass Secure Boot failed attempts and run temporarily the previous Backup image.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
ruckuswireless r310_firmware 10.5.1.0.199 |
||
ruckuswireless r500_firmware 10.5.1.0.199 |
||
ruckuswireless r600_firmware 10.5.1.0.199 |
||
ruckuswireless t300_firmware 10.5.1.0.199 |
||
ruckuswireless t301n_firmware 10.5.1.0.199 |
||
ruckuswireless t301s_firmware 10.5.1.0.199 |
||
ruckuswireless scg200_firmware |
||
ruckuswireless sz-100_firmware |
||
ruckuswireless sz-300_firmware |
||
ruckuswireless vsz_firmware |
||
ruckuswireless zonedirector_1100_firmware 9.10.2.0.130 |
||
ruckuswireless zonedirector_1200_firmware 10.2.1.0.218 |
||
ruckuswireless zonedirector_3000_firmware 10.2.1.0.218 |
||
ruckuswireless zonedirector_5000_firmware 10.0.1.0.151 |