Описание
Ruckus vRioT through 1.5.1.0.21 has an API backdoor that is hardcoded into validate_token.py. An unauthenticated attacker can interact with the service API by using a backdoor value as the Authorization header.
Ссылки
- Third Party Advisory
- ExploitThird Party Advisory
- Vendor Advisory
- ProductVendor Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- ExploitThird Party Advisory
- Vendor Advisory
- ProductVendor Advisory
- Third Party Advisory
- Third Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 1.5.1.0.21 (включая)
Одновременно
cpe:2.3:a:commscope:ruckus_vriot:*:*:*:*:*:*:*:*
cpe:2.3:h:commscope:ruckus_iot_module:-:*:*:*:*:*:*:*
EPSS
Процентиль: 100%
0.89451
Высокий
9.8 Critical
CVSS3
10 Critical
CVSS2
Дефекты
CWE-798
Связанные уязвимости
github
больше 3 лет назад
Ruckus vRioT through 1.5.1.0.21 has an API backdoor that is hardcoded into validate_token.py. An unauthenticated attacker can interact with the service API by using a backdoor value as the Authorization header.
EPSS
Процентиль: 100%
0.89451
Высокий
9.8 Critical
CVSS3
10 Critical
CVSS2
Дефекты
CWE-798