10
CVSSv2

CVE-2021-33218

Published: 07/07/2021 Updated: 09/07/2021
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 890
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

An issue exists in CommScope Ruckus IoT Controller 1.7.1.0 and previous versions. There are Hard-coded System Passwords that provide shell access.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

commscope ruckus iot controller

Exploits

The IoT Controller web application includes a NodeJS module, node-red, which has the capability for users to read or write to local files on the IoT Controller With the elevated privileges the web application runs as, this allowed for reading and writing to any file on the IoT Controller filesystem ...
Hard-coded, system-level credentials exist on the Ruckus IoT Controller OVA image, and are exposed to attackers who mount the filesystem ...

Mailing Lists

<!--X-Body-Begin--> <!--X-User-Header--> Full Disclosure mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> KL-001-2021-003: CommScope Ruckus IoT Controller Hard-coded System Passwords <!--X-Subject-Header-End--> <!--X-Head-of ...