CVE-2019-19843
Severity CVSS v4.0:
Pending analysis
Type:
CWE-522
Insufficiently Protected Credentials
Publication date:
22/01/2020
Last modified:
21/07/2021
Description
Incorrect access control in the web interface in Ruckus Wireless Unleashed through 200.7.10.102.64 allows remote credential fetch via an unauthenticated HTTP request involving a symlink with /tmp and web/user/wps_tool_cache.
Impact
Base Score 3.x
9.80
Severity 3.x
CRITICAL
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:ruckuswireless:unleashed:*:*:*:*:*:*:*:* | 200.7.10.202.94 (excluding) | |
| cpe:2.3:h:ruckuswireless:c110:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:ruckuswireless:e510:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:ruckuswireless:h320:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:ruckuswireless:h510:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:ruckuswireless:m510:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:ruckuswireless:r310:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:ruckuswireless:r320:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:ruckuswireless:r510:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:ruckuswireless:r610:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:ruckuswireless:r710:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:ruckuswireless:r720:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:ruckuswireless:t310:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:ruckuswireless:t610:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:ruckuswireless:t710:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



