ID

VAR-201310-0309


CVE

CVE-2013-5030


TITLE

Ruckus Wireless Zoneflex 2942 Wireless Access Point vulnerable to authentication bypass

Trust: 0.8

sources: CERT/CC: VU#742932

DESCRIPTION

Ruckus Wireless Zoneflex 2942 devices with firmware 9.6.0.0.267 allow remote attackers to bypass authentication, and subsequently access certain configuration/ and maintenance/ scripts, by constructing a crafted URI after receiving an authentication error for an arbitrary login attempt. wireless LAN access point Is Zoneflex 2942 Contains an authentication bypass vulnerability. Ruckus Wireless Provided by wireless LAN Is an access point Zoneflex 2942 There is an authentication bypass vulnerability (CWE-592) Exists.A third party may access the settings screen of the product or restart the product. After receiving a verification failure message, the user can delete the /login.asp part of the URL to bypass the login page. The graphical user interface cannot access other configuration pages, but you can directly edit the URI to access the following page: /configuration/wireless.asp/configuration/local_network.asp/configuration/internet.asp/configuration/device.asp/maintenance/upgrade.asp/maintenance /reboot.asp. RUCKUS WIRELESS Zoneflex 2942 is prone to multiple authentication-bypass vulnerabilities. Successful exploits may allow attackers to reboot the access point, causing a denial-of-service condition. http://drupal.org/node/207891. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 RUCKUS ADVISORY ID 10282013 Customer release date: Oct 28, 2013 Public release date: Nov 28, 2013 TITLE User authentication bypass vulnerability in Ruckus Access Point's administrative web interface SUMMARY An user authentication bypass vulnerability has been discovered in Ruckus Access Point's administrative web interface. AFFECTED SOFTWARE VERSIONS AND DEVICES Device Affected software - -------------------------- ------------------ ZoneFlex Access Points 9.5.x, 9.6.x Any products not mentioned in the table above are not affected DETAILS A weakness has been discovered in the administrative web interface of the Ruckus Access Point devices. The user does not have to be authenticated to the web interface for this attack to be successful. CVSS v2 BASE METRIC SCORE: 6.4 (AV:N/AC:L/Au:N/C:P/I:P/A:N) WORKAROUNDS Ruckus recommends that all customers apply the appropriate patch(es) as soon as practical. However, in the event that a patch cannot immediately be applied, the following suggestions might help reduce the risk: - Do not expose management interfaces of Ruckus devices (including administrative web interface) to untrusted networks such as the Internet. - Use a firewall to limit traffic to/from Ruckus Access Point's administrative web interface to trusted hosts. SOLUTION Ruckus recommends that all customers apply the appropriate patch(es) as soon as practical. The following patches have the fix (any later patches will also have the fix): Branch Software Patch - - ----------- ------------------ 9.5.x 9.5.3.0.44MR 9.6.x 9.6.1.0.15MR CREDITS This vulnerability was discovered and responsibly disclosed to Ruckus Wireless by multiple sources: - - - David Peters of Ansecurity - - - Neil Lines of Nettitude Group This issue has also been reported to CERT and NVD by a third party without informing Ruckus Wireless. http://www.kb.cert.org/vuls/id/742932 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-5030 OBTAINING FIXED FIRMWARE Ruckus customers can obtain the fixed firmware from the support website at https://support.ruckuswireless.com/ Ruckus Support can be contacted as follows: 1-855-RUCKUS1 (1-855-782-5871) (United States) The full contact list is at: https://support.ruckuswireless.com/contact-us PUBLIC ANNOUNCEMENTS This security advisory is strictly confidential and will be made available for public consumption on Nov 28, 2013 at the following source Ruckus Website http://www.ruckuswireless.com/security SecurityFocus Bugtraq http://www.securityfocus.com/archive/1 Future updates of this advisory, if any, will be placed on Ruckus's website, but may or may not be actively announced on mailing lists. REVISION HISTORY Revision 1.0 / 28th Nov 2013 / Initial release RUCKUS WIRELESS SECURITY PROCEDURES Complete information on reporting security vulnerabilities in Ruckus Wireless products, obtaining assistance with security incidents is available at http://www.ruckuswireless.com/security For reporting new security issues, email can be sent to security(at)ruckuswireless.com For sensitive information we encourage the use of PGP encryption. Our public keys can be found at http://www.ruckuswireless.com/security STATUS OF THIS NOTICE: Final Although Ruckus cannot guarantee the accuracy of all statements in this advisory, all of the facts have been checked to the best of our ability. Ruckus does not anticipate issuing updated versions of this advisory unless there is some material change in the facts. Should there be a significant change in the facts, Ruckus may update this advisory. (c) Copyright 2013 by Ruckus Wireless This advisory may be redistributed freely after the public release date given at the top of the text, provided that redistributed copies are complete and unmodified, including all date and version information. -----BEGIN PGP SIGNATURE----- Version: GnuPG/MacGPG2 v2.0.18 (Darwin) Comment: GPGTools - http://gpgtools.org Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/ iQEcBAEBAgAGBQJSlnB/AAoJEFH6g5RLqzh1hoUIAMooTly+eiCi+xXnb5u7U9mW /HrBYdf6ayAIllwtBtbdeWCJd8bpxMeJzYdOY21zNQMWmUzkIREUtMqJRlHrOflT EVqQc67b+SPyGb46nKUoMe8IkYw0ZT/HBWAqbkD1CZqaXR9aPbfKvdksbQvWhXks fBTTowuvs7Ez/2FeJfZIBp3g2skK+1PwZxK8+S/AC0Mlen2MVLJNOf7ZBreZLN9f 7Xa1ZRRI4j3ehvYshUWdDS0c54Nd591PrGgFMpvWbmmOTzRRKqdzOYTanMsmbTSv Qjpu3wwbDVKuz8n7dIigOBjxHnoJqR4TbbRtYU3JOJlpwTWURif89PP45slX4vY= =pNjb -----END PGP SIGNATURE-----

Trust: 3.33

sources: NVD: CVE-2013-5030 // CERT/CC: VU#742932 // JVNDB: JVNDB-2013-004604 // CNVD: CNVD-2013-13711 // BID: 62941 // VULHUB: VHN-65032 // PACKETSTORM: 124210

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2013-13711

AFFECTED PRODUCTS

vendor:ruckuswirelessmodel:zoneflex 2942scope:eqversion:9.6.0.0.267

Trust: 1.6

vendor:ruckuswirelessmodel:zoneflex 2942scope:eqversion: -

Trust: 1.0

vendor:ruckusmodel: - scope: - version: -

Trust: 0.8

vendor:ruckusmodel:zoneflexscope: - version: -

Trust: 0.8

vendor:ruckusmodel:zoneflex 2942scope:lteversion:9.6.0.0.267

Trust: 0.8

vendor:ruckusmodel:zoneflexscope:eqversion:29429.6.0.0.267

Trust: 0.6

sources: CERT/CC: VU#742932 // CNVD: CNVD-2013-13711 // JVNDB: JVNDB-2013-004604 // CNNVD: CNNVD-201310-270 // NVD: CVE-2013-5030

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2013-5030
value: HIGH

Trust: 1.0

NVD: CVE-2013-5030
value: MEDIUM

Trust: 0.8

NVD: CVE-2013-5030
value: HIGH

Trust: 0.8

CNVD: CNVD-2013-13711
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201310-270
value: HIGH

Trust: 0.6

VULHUB: VHN-65032
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2013-5030
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

NVD: CVE-2013-5030
severity: MEDIUM
baseScore: 5.9
vectorString: NONE
accessVector: LOCAL
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: COMPLETE
availabilityImpact: PARTIAL
exploitabilityScore: 3.4
impactScore: 8.5
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2013-13711
severity: MEDIUM
baseScore: 5.9
vectorString: AV:L/AC:M/AU:N/C:P/I:C/A:P
accessVector: LOCAL
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: COMPLETE
availabilityImpact: PARTIAL
exploitabilityScore: 3.4
impactScore: 8.5
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-65032
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CERT/CC: VU#742932 // CNVD: CNVD-2013-13711 // VULHUB: VHN-65032 // JVNDB: JVNDB-2013-004604 // CNNVD: CNNVD-201310-270 // NVD: CVE-2013-5030

PROBLEMTYPE DATA

problemtype:CWE-264

Trust: 1.9

problemtype:CWE-592

Trust: 0.8

sources: CERT/CC: VU#742932 // VULHUB: VHN-65032 // JVNDB: JVNDB-2013-004604 // NVD: CVE-2013-5030

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-201310-270

TYPE

permissions and access control

Trust: 0.6

sources: CNNVD: CNNVD-201310-270

CONFIGURATIONS

sources: JVNDB: JVNDB-2013-004604

EXPLOIT AVAILABILITY

sources: CERT/CC: VU#742932 // VULHUB: VHN-65032

PATCH

title:ZoneFlex 2942url:http://www.ruckuswireless.com/products/zoneflex-indoor/2942

Trust: 0.8

sources: JVNDB: JVNDB-2013-004604

EXTERNAL IDS

db:CERT/CCid:VU#742932

Trust: 4.0

db:NVDid:CVE-2013-5030

Trust: 3.5

db:BIDid:62941

Trust: 1.6

db:JVNid:JVNVU99397682

Trust: 0.8

db:JVNDBid:JVNDB-2013-004604

Trust: 0.8

db:CNNVDid:CNNVD-201310-270

Trust: 0.7

db:CNVDid:CNVD-2013-13711

Trust: 0.6

db:EXPLOIT-DBid:29709

Trust: 0.1

db:SEEBUGid:SSVID-83196

Trust: 0.1

db:PACKETSTORMid:124099

Trust: 0.1

db:VULHUBid:VHN-65032

Trust: 0.1

db:PACKETSTORMid:124210

Trust: 0.1

sources: CERT/CC: VU#742932 // CNVD: CNVD-2013-13711 // VULHUB: VHN-65032 // BID: 62941 // JVNDB: JVNDB-2013-004604 // PACKETSTORM: 124210 // CNNVD: CNNVD-201310-270 // NVD: CVE-2013-5030

REFERENCES

url:http://www.kb.cert.org/vuls/id/742932

Trust: 3.2

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-5030

Trust: 0.9

url:http://cwe.mitre.org/data/definitions/592.html

Trust: 0.8

url:http://www.ruckuswireless.com/products/zoneflex-indoor/2942

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-5030

Trust: 0.8

url:http://jvn.jp/cert/jvnvu99397682

Trust: 0.8

url:http://www.securityfocus.com/bid/62941

Trust: 0.6

url:https://support.ruckuswireless.com/contact-us

Trust: 0.1

url:https://support.ruckuswireless.com/

Trust: 0.1

url:http://enigmail.mozdev.org/

Trust: 0.1

url:http://www.ruckuswireless.com/security

Trust: 0.1

url:http://www.securityfocus.com/archive/1

Trust: 0.1

url:http://gpgtools.org

Trust: 0.1

sources: CERT/CC: VU#742932 // CNVD: CNVD-2013-13711 // VULHUB: VHN-65032 // JVNDB: JVNDB-2013-004604 // PACKETSTORM: 124210 // CNNVD: CNNVD-201310-270 // NVD: CVE-2013-5030

CREDITS

MyExploit

Trust: 0.9

sources: BID: 62941 // CNNVD: CNNVD-201310-270

SOURCES

db:CERT/CCid:VU#742932
db:CNVDid:CNVD-2013-13711
db:VULHUBid:VHN-65032
db:BIDid:62941
db:JVNDBid:JVNDB-2013-004604
db:PACKETSTORMid:124210
db:CNNVDid:CNNVD-201310-270
db:NVDid:CVE-2013-5030

LAST UPDATE DATE

2025-04-11T23:08:40.551000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#742932date:2013-10-10T00:00:00
db:CNVDid:CNVD-2013-13711date:2013-10-16T00:00:00
db:VULHUBid:VHN-65032date:2014-04-23T00:00:00
db:BIDid:62941date:2013-11-28T07:15:00
db:JVNDBid:JVNDB-2013-004604date:2013-10-18T00:00:00
db:CNNVDid:CNNVD-201310-270date:2013-10-17T00:00:00
db:NVDid:CVE-2013-5030date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:CERT/CCid:VU#742932date:2013-10-10T00:00:00
db:CNVDid:CNVD-2013-13711date:2013-10-15T00:00:00
db:VULHUBid:VHN-65032date:2013-10-16T00:00:00
db:BIDid:62941date:2013-10-10T00:00:00
db:JVNDBid:JVNDB-2013-004604date:2013-10-15T00:00:00
db:PACKETSTORMid:124210date:2013-11-29T14:33:33
db:CNNVDid:CNNVD-201310-270date:2013-10-17T00:00:00
db:NVDid:CVE-2013-5030date:2013-10-16T10:52:44.823