CVE-2017-6224

high-risk
Published 2017-10-13

Ruckus Wireless Zone Director Controller firmware releases ZD9.x, ZD10.0.0.x, ZD10.0.1.x (less than 10.0.1.0.17 MR1 release) and Ruckus Wireless Unleashed AP Firmware releases 200.0.x, 200.1.x, 200.2.x, 200.3.x, 200.4.x. contain OS Command Injection vulnerabilities that could allow local authenticated users to execute arbitrary privileged commands on the underlying operating system by appending those commands in the Common Name field in the Certificate Generation Request.

Do I need to act?

-
0.87% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.8/10 High
NETWORK / LOW complexity

Affected Products (12)

Zonedirector Firmware
Zonedirector Firmware
Zonedirector Firmware
Unleashed Firmware
Unleashed Firmware
Unleashed Firmware
Unleashed Firmware
Zonedirector Firmware
Zonedirector Firmware
Zonedirector Firmware
Unleashed Firmware
Unleashed Firmware

Affected Vendors

50
/ 100
high-risk
Severity 30/34 · Critical
Exploitability 3/34 · Minimal
Exposure 17/34 · Moderate