TROYANOSYVIRUS
Zuruck zu CVEs

CVE-2019-19843

CRITICAL
9.8

Beschreibung

Incorrect access control in the web interface in Ruckus Wireless Unleashed through 200.7.10.102.64 allows remote credential fetch via an unauthenticated HTTP request involving a symlink with /tmp and web/user/wps_tool_cache.

CVE Details

CVSS v3.1 Bewertung9.8
SchweregradCRITICAL
CVSS VektorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AngriffsvektorNETWORK
KomplexitatLOW
Erforderliche PrivilegienNONE
BenutzerinteraktionNONE
Veroffentlicht1/22/2020
Zuletzt geandert11/21/2024
Quellenvd
Honeypot-Sichtungen0

Betroffene Produkte

ruckuswireless:c110ruckuswireless:e510ruckuswireless:h320ruckuswireless:h510ruckuswireless:m510ruckuswireless:r310ruckuswireless:r320ruckuswireless:r510ruckuswireless:r610ruckuswireless:r710ruckuswireless:r720ruckuswireless:t310ruckuswireless:t610ruckuswireless:t710ruckuswireless:unleashedruckuswireless:zonedirector_1200ruckuswireless:zonedirector_1200_firmware

Schwachen (CWE)

CWE-522CWE-552

IOC Korrelationen

Keine Korrelationen erfasst

This product uses data from the NVD API but is not endorsed or certified by the NVD.