ID

VAR-201610-0377


CVE

CVE-2016-1000216


TITLE

Ruckus Wireless H500 of Web Command insertion vulnerability in the management interface

Trust: 0.8

sources: JVNDB: JVNDB-2016-005423

DESCRIPTION

Ruckus Wireless H500 web management interface authenticated command injection. RUCKUS ZoneFlex H500 is prone to a remote command-injection vulnerability because it fails to properly sanitize user-supplied input. Successfully exploiting this issue may allow an attacker to execute arbitrary commands in context of the affected device. Ruckus Wireless H500 is an indoor wall switch access point of Ruckus Wireless in the United States

Trust: 1.98

sources: NVD: CVE-2016-1000216 // JVNDB: JVNDB-2016-005423 // BID: 93539 // VULHUB: VHN-88668

AFFECTED PRODUCTS

vendor:ruckusmodel:wireless h500scope:eqversion: -

Trust: 1.6

vendor:ruckusmodel:zoneflex h500scope: - version: -

Trust: 0.8

vendor:ruckuswirelessmodel:zoneflex h500scope:eqversion:100.1.0.0.432

Trust: 0.3

sources: BID: 93539 // JVNDB: JVNDB-2016-005423 // CNNVD: CNNVD-201610-260 // NVD: CVE-2016-1000216

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2016-1000216
value: HIGH

Trust: 1.0

NVD: CVE-2016-1000216
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201610-260
value: CRITICAL

Trust: 0.6

VULHUB: VHN-88668
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2016-1000216
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-88668
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2016-1000216
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-88668 // JVNDB: JVNDB-2016-005423 // CNNVD: CNNVD-201610-260 // NVD: CVE-2016-1000216

PROBLEMTYPE DATA

problemtype:CWE-78

Trust: 1.9

sources: VULHUB: VHN-88668 // JVNDB: JVNDB-2016-005423 // NVD: CVE-2016-1000216

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201610-260

TYPE

operating system commend injection

Trust: 0.6

sources: CNNVD: CNNVD-201610-260

CONFIGURATIONS

sources: JVNDB: JVNDB-2016-005423

PATCH

title:Owning Ruckus Wireless Access Pointsurl:https://bitbucket.org/dudux/ruckus-rootshell

Trust: 0.8

title:ZoneFlex H500url:https://www.ruckuswireless.com/products/access-points/zoneflex-indoor/zoneflex-h500

Trust: 0.8

sources: JVNDB: JVNDB-2016-005423

EXTERNAL IDS

db:NVDid:CVE-2016-1000216

Trust: 2.8

db:BIDid:93539

Trust: 1.4

db:JVNDBid:JVNDB-2016-005423

Trust: 0.8

db:CNNVDid:CNNVD-201610-260

Trust: 0.7

db:VULHUBid:VHN-88668

Trust: 0.1

sources: VULHUB: VHN-88668 // BID: 93539 // JVNDB: JVNDB-2016-005423 // CNNVD: CNNVD-201610-260 // NVD: CVE-2016-1000216

REFERENCES

url:http://www.tripwire.com/state-of-security/vulnerability-management/ruckus-vulnerability/

Trust: 2.8

url:https://bitbucket.org/dudux/ruckus-rootshell

Trust: 2.0

url:http://www.securityfocus.com/bid/93539

Trust: 1.1

url:http://b910a83a1a1fa9c20d93-2435f2f08e773abe005b52170fce6d94.r84.cf2.rackcdn.com/security/faq-security-advisory-id-062117.txt

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-1000216

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-1000216

Trust: 0.8

url:http://www.ruckuswireless.com/

Trust: 0.3

sources: VULHUB: VHN-88668 // BID: 93539 // JVNDB: JVNDB-2016-005423 // CNNVD: CNNVD-201610-260 // NVD: CVE-2016-1000216

CREDITS

Craig Young

Trust: 0.3

sources: BID: 93539

SOURCES

db:VULHUBid:VHN-88668
db:BIDid:93539
db:JVNDBid:JVNDB-2016-005423
db:CNNVDid:CNNVD-201610-260
db:NVDid:CVE-2016-1000216

LAST UPDATE DATE

2025-04-13T23:32:36.871000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-88668date:2017-07-07T00:00:00
db:BIDid:93539date:2016-10-26T04:09:00
db:JVNDBid:JVNDB-2016-005423date:2016-10-20T00:00:00
db:CNNVDid:CNNVD-201610-260date:2016-10-11T00:00:00
db:NVDid:CVE-2016-1000216date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:VULHUBid:VHN-88668date:2016-10-10T00:00:00
db:BIDid:93539date:2016-08-03T00:00:00
db:JVNDBid:JVNDB-2016-005423date:2016-10-20T00:00:00
db:CNNVDid:CNNVD-201610-260date:2016-10-11T00:00:00
db:NVDid:CVE-2016-1000216date:2016-10-10T20:59:35.003