7.5
CVSSv3

CVE-2020-22662

Published: 20/01/2023 Updated: 01/02/2023
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 0

Vulnerability Summary

In Ruckus R310 10.5.1.0.199, Ruckus R500 10.5.1.0.199, Ruckus R600 10.5.1.0.199, Ruckus T300 10.5.1.0.199, Ruckus T301n 10.5.1.0.199, Ruckus T301s 10.5.1.0.199, SmartCell Gateway 200 (SCG200) prior to 3.6.2.0.795, SmartZone 100 (SZ-100) prior to 3.6.2.0.795, SmartZone 300 (SZ300) prior to 3.6.2.0.795, Virtual SmartZone (vSZ) prior to 3.6.2.0.795, ZoneDirector 1100 9.10.2.0.130, ZoneDirector 1200 10.2.1.0.218, ZoneDirector 3000 10.2.1.0.218, ZoneDirector 5000 10.0.1.0.151, a vulnerability allows malicious users to change and set unauthorized "illegal region code" by remote code Execution command injection which leads to run illegal frequency with maxi output power. Vulnerability allows malicious user to create an arbitrary amount of ssid wlans interface per radio which creates overhead over noise (the default max limit is 8 ssid only per radio in solo AP). Vulnerability allows malicious user to unlock hidden regions by privilege command injection in WEB GUI.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

ruckuswireless r310_firmware 10.5.1.0.199

ruckuswireless r500_firmware 10.5.1.0.199

ruckuswireless r600_firmware 10.5.1.0.199

ruckuswireless t300_firmware 10.5.1.0.199

ruckuswireless t301n_firmware 10.5.1.0.199

ruckuswireless t301s_firmware 10.5.1.0.199

ruckuswireless scg200_firmware

ruckuswireless sz-100_firmware

ruckuswireless sz-300_firmware

ruckuswireless vsz_firmware

ruckuswireless zonedirector_1100_firmware 9.10.2.0.130

ruckuswireless zonedirector_1200_firmware 10.2.1.0.218

ruckuswireless zonedirector_3000_firmware 10.2.1.0.218

ruckuswireless zonedirector_5000_firmware 10.0.1.0.151