ID

VAR-202301-1662


CVE

CVE-2020-22662


TITLE

plural  Ruckus Networks ( Old  Ruckus Wireless, Inc.)  Command injection vulnerabilities in the product

Trust: 0.8

sources: JVNDB: JVNDB-2020-017630

DESCRIPTION

In Ruckus R310 10.5.1.0.199, Ruckus R500 10.5.1.0.199, Ruckus R600 10.5.1.0.199, Ruckus T300 10.5.1.0.199, Ruckus T301n 10.5.1.0.199, Ruckus T301s 10.5.1.0.199, SmartCell Gateway 200 (SCG200) before 3.6.2.0.795, SmartZone 100 (SZ-100) before 3.6.2.0.795, SmartZone 300 (SZ300) before 3.6.2.0.795, Virtual SmartZone (vSZ) before 3.6.2.0.795, ZoneDirector 1100 9.10.2.0.130, ZoneDirector 1200 10.2.1.0.218, ZoneDirector 3000 10.2.1.0.218, ZoneDirector 5000 10.0.1.0.151, a vulnerability allows attackers to change and set unauthorized "illegal region code" by remote code Execution command injection which leads to run illegal frequency with maxi output power. Vulnerability allows attacker to create an arbitrary amount of ssid wlans interface per radio which creates overhead over noise (the default max limit is 8 ssid only per radio in solo AP). Vulnerability allows attacker to unlock hidden regions by privilege command injection in WEB GUI. plural Ruckus Networks ( Old Ruckus Wireless, Inc.) Contains a command injection vulnerability.Information may be tampered with

Trust: 1.71

sources: NVD: CVE-2020-22662 // JVNDB: JVNDB-2020-017630 // VULMON: CVE-2020-22662

IOT TAXONOMY

category:['network device']sub_category:access point

Trust: 0.1

sources: OTHER: None

AFFECTED PRODUCTS

vendor:ruckuswirelessmodel:zonedirector 1100scope:eqversion:9.10.2.0.130

Trust: 1.0

vendor:ruckuswirelessmodel:t301sscope:eqversion:10.5.1.0.199

Trust: 1.0

vendor:ruckuswirelessmodel:r500scope:eqversion:10.5.1.0.199

Trust: 1.0

vendor:ruckuswirelessmodel:r310scope:eqversion:10.5.1.0.199

Trust: 1.0

vendor:ruckuswirelessmodel:r600scope:eqversion:10.5.1.0.199

Trust: 1.0

vendor:ruckuswirelessmodel:t301nscope:eqversion:10.5.1.0.199

Trust: 1.0

vendor:ruckuswirelessmodel:zonedirector 3000scope:eqversion:10.2.1.0.218

Trust: 1.0

vendor:ruckuswirelessmodel:sz-100scope:ltversion:3.6.2.0.795

Trust: 1.0

vendor:ruckuswirelessmodel:t300scope:eqversion:10.5.1.0.199

Trust: 1.0

vendor:ruckuswirelessmodel:sz-300scope:ltversion:3.6.2.0.795

Trust: 1.0

vendor:ruckuswirelessmodel:zonedirector 5000scope:eqversion:10.0.1.0.151

Trust: 1.0

vendor:ruckuswirelessmodel:scg200scope:ltversion:3.6.2.0.795

Trust: 1.0

vendor:ruckuswirelessmodel:zonedirector 1200scope:eqversion:10.2.1.0.218

Trust: 1.0

vendor:ruckuswirelessmodel:vszscope:ltversion:3.6.2.0.795

Trust: 1.0

vendor:ruckus 旧 ruckusmodel:vszscope: - version: -

Trust: 0.8

vendor:ruckus 旧 ruckusmodel:zonedirector 3000scope: - version: -

Trust: 0.8

vendor:ruckus 旧 ruckusmodel:sz-100scope: - version: -

Trust: 0.8

vendor:ruckus 旧 ruckusmodel:t300scope: - version: -

Trust: 0.8

vendor:ruckus 旧 ruckusmodel:r310scope: - version: -

Trust: 0.8

vendor:ruckus 旧 ruckusmodel:r600scope: - version: -

Trust: 0.8

vendor:ruckus 旧 ruckusmodel:zonedirector 5000scope: - version: -

Trust: 0.8

vendor:ruckus 旧 ruckusmodel:r500scope: - version: -

Trust: 0.8

vendor:ruckus 旧 ruckusmodel:zonedirector 1100scope: - version: -

Trust: 0.8

vendor:ruckus 旧 ruckusmodel:scg200scope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2020-017630 // NVD: CVE-2020-22662

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-22662
value: HIGH

Trust: 1.0

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2020-22662
value: HIGH

Trust: 1.0

NVD: CVE-2020-22662
value: HIGH

Trust: 0.8

CNNVD: CNNVD-202301-1621
value: HIGH

Trust: 0.6

nvd@nist.gov: CVE-2020-22662
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 2.0

NVD: CVE-2020-22662
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2020-017630 // CNNVD: CNNVD-202301-1621 // NVD: CVE-2020-22662 // NVD: CVE-2020-22662

PROBLEMTYPE DATA

problemtype:CWE-77

Trust: 1.0

problemtype:Command injection (CWE-77) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2020-017630 // NVD: CVE-2020-22662

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202301-1621

TYPE

command injection

Trust: 0.6

sources: CNNVD: CNNVD-202301-1621

PATCH

title:Security Bulletin 20200302url:https://support.ruckuswireless.com/security_bulletins/302

Trust: 0.8

title:Ruckus Networks Repair measures for command injection vulnerabilities in multiple productsurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=223507

Trust: 0.6

sources: JVNDB: JVNDB-2020-017630 // CNNVD: CNNVD-202301-1621

EXTERNAL IDS

db:NVDid:CVE-2020-22662

Trust: 3.4

db:JVNDBid:JVNDB-2020-017630

Trust: 0.8

db:CNNVDid:CNNVD-202301-1621

Trust: 0.6

db:OTHERid:NONE

Trust: 0.1

db:VULMONid:CVE-2020-22662

Trust: 0.1

sources: OTHER: None // VULMON: CVE-2020-22662 // JVNDB: JVNDB-2020-017630 // CNNVD: CNNVD-202301-1621 // NVD: CVE-2020-22662

REFERENCES

url:https://support.ruckuswireless.com/security_bulletins/302

Trust: 1.7

url:https://hdhrmi.blogspot.com/2020/03/multiple-vulnerabilities-in-ruckus.html?m=1

Trust: 1.0

url:https://nvd.nist.gov/vuln/detail/cve-2020-22662

Trust: 0.8

url:https://cxsecurity.com/cveshow/cve-2020-22662/

Trust: 0.6

url:https://ieeexplore.ieee.org/abstract/document/10769424

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: OTHER: None // VULMON: CVE-2020-22662 // JVNDB: JVNDB-2020-017630 // CNNVD: CNNVD-202301-1621 // NVD: CVE-2020-22662

SOURCES

db:OTHERid: -
db:VULMONid:CVE-2020-22662
db:JVNDBid:JVNDB-2020-017630
db:CNNVDid:CNNVD-202301-1621
db:NVDid:CVE-2020-22662

LAST UPDATE DATE

2025-04-04T23:31:31.610000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2020-22662date:2023-01-23T00:00:00
db:JVNDBid:JVNDB-2020-017630date:2023-07-11T06:53:00
db:CNNVDid:CNNVD-202301-1621date:2023-02-02T00:00:00
db:NVDid:CVE-2020-22662date:2025-04-03T18:15:40.630

SOURCES RELEASE DATE

db:VULMONid:CVE-2020-22662date:2023-01-20T00:00:00
db:JVNDBid:JVNDB-2020-017630date:2023-07-11T00:00:00
db:CNNVDid:CNNVD-202301-1621date:2023-01-20T00:00:00
db:NVDid:CVE-2020-22662date:2023-01-20T19:15:13.063