HIGH · 7.2

CVE-2019-19834

Directory Traversal in ruckus_cli2 in Ruckus Wireless Unleashed through 200.7.10.102.64 allows a remote attacker to jailbreak the CLI via enable->debug->script->exec with ../../../bin/sh as the parame...

Vulnerability Description

Directory Traversal in ruckus_cli2 in Ruckus Wireless Unleashed through 200.7.10.102.64 allows a remote attacker to jailbreak the CLI via enable->debug->script->exec with ../../../bin/sh as the parameter.

CVSS Score

7.2

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH

Affected Products

VendorProductVersions
RuckuswirelessUnleashed< 200.7.10.202.94
RuckuswirelessC110-
RuckuswirelessE510-
RuckuswirelessH320-
RuckuswirelessH510-
RuckuswirelessM510-
RuckuswirelessR310-
RuckuswirelessR320-
RuckuswirelessR510-
RuckuswirelessR610-
RuckuswirelessR710-
RuckuswirelessR720-
RuckuswirelessT310-
RuckuswirelessT610-
RuckuswirelessT710-
RuckuswirelessZonedirector 1200 Firmware< 9.10.2.0.84
RuckuswirelessZonedirector 1200-

Related Weaknesses (CWE)

References

FAQ

What is CVE-2019-19834?

CVE-2019-19834 is a vulnerability with a CVSS score of 7.2 (HIGH). Directory Traversal in ruckus_cli2 in Ruckus Wireless Unleashed through 200.7.10.102.64 allows a remote attacker to jailbreak the CLI via enable->debug->script->exec with ../../../bin/sh as the parame...

How severe is CVE-2019-19834?

CVE-2019-19834 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2019-19834?

Check the references section above for vendor advisories and patch information. Affected products include: Ruckuswireless Unleashed, Ruckuswireless C110, Ruckuswireless E510, Ruckuswireless H320, Ruckuswireless H510.