Page 3 of 48 results (0.006 seconds)

CVSS: 10.0EPSS: 1%CPEs: 1EXPL: 1

27 May 2021 — An issue was discovered in CommScope Ruckus IoT Controller 1.7.1.0 and earlier. There are Hard-coded System Passwords that provide shell access. Se ha detectado un problema en CommScope Ruckus IoT Controller versiones 1.7.1.0 y anteriores. Se presentan Contraseñas de Sistema Embebidas que proporcionan acceso al shell Hard-coded, system-level credentials exist on the Ruckus IoT Controller OVA image, and are exposed to attackers who mount the filesystem. • https://packetstorm.news/files/id/162844 • CWE-798: Use of Hard-coded Credentials •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 1

27 May 2021 — An issue was discovered in CommScope Ruckus IoT Controller 1.7.1.0 and earlier. Hard-coded API Keys exist. Se ha detectado un problema en CommScope Ruckus IoT Controller versiones 1.7.1.0 y anteriores. Se presentan Claves de API Embebidas API keys for CommScope Ruckus are included in the IoT Controller OVA image, and are exposed to attackers who mount the filesystem. • https://packetstorm.news/files/id/162843 • CWE-798: Use of Hard-coded Credentials •

CVSS: 9.8EPSS: 90%CPEs: 1EXPL: 2

27 May 2021 — An issue was discovered in CommScope Ruckus IoT Controller 1.7.1.0 and earlier. There are Unauthenticated API Endpoints. Se ha detectado un problema en CommScope Ruckus IoT Controller versiones 1.7.1.0 y anteriores. Se presentan unos Endpoints de API no Autenticados Three API endpoints for the IoT Controller are accessible without authentication. Two of the endpoints result in information leakage and consumption of computing/storage resources. • https://packetstorm.news/files/id/162842 • CWE-306: Missing Authentication for Critical Function •

CVSS: 10.0EPSS: 91%CPEs: 2EXPL: 1

26 Oct 2020 — Ruckus vRioT through 1.5.1.0.21 has an API backdoor that is hardcoded into validate_token.py. An unauthenticated attacker can interact with the service API by using a backdoor value as the Authorization header. Ruckus vRioT versiones hasta 1.5.1.0.21, presenta una puerta trasera de API que está embebida en el archivo validate_token.py. Un atacante no autenticado puede interactuar con la API de servicio al usar un valor de backdoor como el encabezado Authorization • https://adepts.of0x.cc • CWE-798: Use of Hard-coded Credentials •

CVSS: 9.0EPSS: 62%CPEs: 2EXPL: 2

26 Oct 2020 — Ruckus through 1.5.1.0.21 is affected by remote command injection. An authenticated user can submit a query to the API (/service/v1/createUser endpoint), injecting arbitrary commands that will be executed as root user via web.py. Ruckus versiones hasta 1.5.1.0.21, está afectado por una inyección de comandos remota. Un usuario autenticado puede enviar una consulta a la API (endpoint /service/v1/createUser), inyectando comandos arbitrarios que serán ejecutados como usuario root por medio del archivo web.... • https://github.com/htarsoo/CVE-2020-26878 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 8.8EPSS: 0%CPEs: 2EXPL: 1

05 May 2020 — CSRF in login.asp on Ruckus devices allows an attacker to access the panel, and use SSRF to perform scraping or other analysis via the SUBCA-1 field on the Wireless Admin screen. Una vulnerabilidad de tipo CSRF en el archivo login.asp en dispositivos Ruckus, permite a un atacante acceder al panel y usar un ataque de tipo SSRF para llevar a cabo scraping u otro análisis por medio del campo SUBCA-1 en la pantalla Wireless Admin. • https://gist.github.com/CyberSecurityUP/26c5b032897630fe8407da4a8ef216d4 • CWE-352: Cross-Site Request Forgery (CSRF) CWE-918: Server-Side Request Forgery (SSRF) •

CVSS: 6.1EPSS: 0%CPEs: 2EXPL: 1

05 May 2020 — Ruckus R500 3.4.2.0.384 devices allow XSS via the index.asp Device Name field. Los dispositivos Ruckus R500 versión 3.4.2.0.384, permiten un ataque de tipo XSS, por medio del campo Device Name del archivo index.asp. • https://gist.github.com/CyberSecurityUP/26c5b032897630fe8407da4a8ef216d4 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 8.1EPSS: 0%CPEs: 2EXPL: 1

05 May 2020 — A CSRF issue in login.asp on Ruckus R500 3.4.2.0.384 devices allows remote attackers to access the panel or conduct SSRF attacks. Un problema de tipo CSRF en el archivo login.asp en dispositivos Ruckus R500 versión 3.4.2.0.384, permite a atacantes remotos acceder al panel o conducir ataques de tipo SSRF. • https://gist.github.com/CyberSecurityUP/26c5b032897630fe8407da4a8ef216d4 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

04 Mar 2020 — ARRIS TG1692A devices allow remote attackers to discover the administrator login name and password by reading the /login page and performing base64 decoding. Los dispositivos ARRIS TG1692A, permiten a atacantes remotos detectar el nombre de usuario y la contraseña del administrador al leer la página /login y realizar la decodificación base64. • https://arris.secure.force.com/consumers/ConsumerProductSupport • CWE-326: Inadequate Encryption Strength •

CVSS: 9.8EPSS: 0%CPEs: 2EXPL: 0

29 Aug 2019 — CommScope ARRIS TR4400 devices with firmware through A1.00.004-180301 are vulnerable to an authentication bypass to the administrative interface because they include the current base64 encoded password within http://192.168.1.1/login.html. Any user connected to the Wi-Fi can exploit this. Los dispositivos CommScope ARRIS TR4400 con versiones de firmware hasta A1.00.004-180301, son vulnerables a una omisión de autenticación a la interfaz administrativa porque incluyen la contraseña codificada en base64 actua... • https://medium.com/%40v.roberthoutenbrink/commscope-vulnerability-authentication-bypass-in-arris-tr4400-firmware-version-a1-00-004-180301-4a90aa8e7570 • CWE-326: Inadequate Encryption Strength •