Injection Vulnerability in Ruckus Wireless Access Points and Controllers
CVE-2020-22653
9.8CRITICAL
Summary
A vulnerability in Ruckus Wireless products allows attackers to exploit the official image signature mechanism, enabling the unauthorized injection of malicious image signatures. This could potentially lead to compromised devices and unauthorized access to network resources. Affected products include various access points and controllers running specific firmware versions, underscoring the need for timely updates and robust security measures.
References
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved