Page 5 of 48 results (0.003 seconds)

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

An issue was discovered in CommScope Ruckus IoT Controller 1.7.1.0 and earlier. There are Hard-coded System Passwords that provide shell access. Se ha detectado un problema en CommScope Ruckus IoT Controller versiones 1.7.1.0 y anteriores. Se presentan Contraseñas de Sistema Embebidas que proporcionan acceso al shell Hard-coded, system-level credentials exist on the Ruckus IoT Controller OVA image, and are exposed to attackers who mount the filesystem. • https://korelogic.com/advisories.html https://seclists.org/fulldisclosure/2021/May/74 • CWE-798: Use of Hard-coded Credentials •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

An issue was discovered in CommScope Ruckus IoT Controller 1.7.1.0 and earlier. Hard-coded API Keys exist. Se ha detectado un problema en CommScope Ruckus IoT Controller versiones 1.7.1.0 y anteriores. Se presentan Claves de API Embebidas API keys for CommScope Ruckus are included in the IoT Controller OVA image, and are exposed to attackers who mount the filesystem. • http://seclists.org/fulldisclosure/2021/May/73 https://korelogic.com/advisories.html • CWE-798: Use of Hard-coded Credentials •

CVSS: 9.8EPSS: 37%CPEs: 1EXPL: 1

An issue was discovered in CommScope Ruckus IoT Controller 1.7.1.0 and earlier. There are Unauthenticated API Endpoints. Se ha detectado un problema en CommScope Ruckus IoT Controller versiones 1.7.1.0 y anteriores. Se presentan unos Endpoints de API no Autenticados Three API endpoints for the IoT Controller are accessible without authentication. Two of the endpoints result in information leakage and consumption of computing/storage resources. • http://seclists.org/fulldisclosure/2021/May/72 https://korelogic.com/advisories.html • CWE-306: Missing Authentication for Critical Function •

CVSS: 10.0EPSS: 38%CPEs: 2EXPL: 1

Ruckus vRioT through 1.5.1.0.21 has an API backdoor that is hardcoded into validate_token.py. An unauthenticated attacker can interact with the service API by using a backdoor value as the Authorization header. Ruckus vRioT versiones hasta 1.5.1.0.21, presenta una puerta trasera de API que está embebida en el archivo validate_token.py. Un atacante no autenticado puede interactuar con la API de servicio al usar un valor de backdoor como el encabezado Authorization • https://adepts.of0x.cc https://adepts.of0x.cc/ruckus-vriot-rce https://support.ruckuswireless.com/documents https://support.ruckuswireless.com/security_bulletins/305 https://twitter.com/TheXC3LL https://x-c3ll.github.io • CWE-798: Use of Hard-coded Credentials •

CVSS: 9.0EPSS: 90%CPEs: 2EXPL: 2

Ruckus through 1.5.1.0.21 is affected by remote command injection. An authenticated user can submit a query to the API (/service/v1/createUser endpoint), injecting arbitrary commands that will be executed as root user via web.py. Ruckus versiones hasta 1.5.1.0.21, está afectado por una inyección de comandos remota. Un usuario autenticado puede enviar una consulta a la API (endpoint /service/v1/createUser), inyectando comandos arbitrarios que serán ejecutados como usuario root por medio del archivo web.py • https://github.com/htarsoo/CVE-2020-26878 https://adepts.of0x.cc https://adepts.of0x.cc/ruckus-vriot-rce https://support.ruckuswireless.com/documents https://support.ruckuswireless.com/security_bulletins/305 https://twitter.com/TheXC3LL https://x-c3ll.github.io • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •