7.5
CVSSv3

CVE-2020-22662

Published: 20/01/2023 Updated: 01/02/2023
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 0

Vulnerability Summary

In Ruckus R310 10.5.1.0.199, Ruckus R500 10.5.1.0.199, Ruckus R600 10.5.1.0.199, Ruckus T300 10.5.1.0.199, Ruckus T301n 10.5.1.0.199, Ruckus T301s 10.5.1.0.199, SmartCell Gateway 200 (SCG200) prior to 3.6.2.0.795, SmartZone 100 (SZ-100) prior to 3.6.2.0.795, SmartZone 300 (SZ300) prior to 3.6.2.0.795, Virtual SmartZone (vSZ) prior to 3.6.2.0.795, ZoneDirector 1100 9.10.2.0.130, ZoneDirector 1200 10.2.1.0.218, ZoneDirector 3000 10.2.1.0.218, ZoneDirector 5000 10.0.1.0.151, a vulnerability allows malicious users to change and set unauthorized "illegal region code" by remote code Execution command injection which leads to run illegal frequency with maxi output power. Vulnerability allows malicious user to create an arbitrary amount of ssid wlans interface per radio which creates overhead over noise (the default max limit is 8 ssid only per radio in solo AP). Vulnerability allows malicious user to unlock hidden regions by privilege command injection in WEB GUI.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

ruckuswireless r310 firmware 10.5.1.0.199

ruckuswireless r500 firmware 10.5.1.0.199

ruckuswireless r600 firmware 10.5.1.0.199

ruckuswireless t300 firmware 10.5.1.0.199

ruckuswireless t301n firmware 10.5.1.0.199

ruckuswireless t301s firmware 10.5.1.0.199

ruckuswireless scg200 firmware

ruckuswireless sz-100 firmware

ruckuswireless sz-300 firmware

ruckuswireless vsz firmware

ruckuswireless zonedirector 1100 firmware 9.10.2.0.130

ruckuswireless zonedirector 1200 firmware 10.2.1.0.218

ruckuswireless zonedirector 3000 firmware 10.2.1.0.218

ruckuswireless zonedirector 5000 firmware 10.0.1.0.151