CVE-2020-22654
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
20/01/2023
Last modified:
03/04/2025
Description
In Ruckus R310 10.5.1.0.199, Ruckus R500 10.5.1.0.199, Ruckus R600 10.5.1.0.199, Ruckus T300 10.5.1.0.199, Ruckus T301n 10.5.1.0.199, Ruckus T301s 10.5.1.0.199, SmartCell Gateway 200 (SCG200) before 3.6.2.0.795, SmartZone 100 (SZ-100) before 3.6.2.0.795, SmartZone 300 (SZ300) before 3.6.2.0.795, Virtual SmartZone (vSZ) before 3.6.2.0.795, ZoneDirector 1100 9.10.2.0.130, ZoneDirector 1200 10.2.1.0.218, ZoneDirector 3000 10.2.1.0.218, ZoneDirector 5000 10.0.1.0.151, a vulnerability allows attackers to bypass firmware image bad md5 checksum failed error.
Impact
Base Score 3.x
9.80
Severity 3.x
CRITICAL
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:ruckuswireless:r310_firmware:10.5.1.0.199:*:*:*:*:*:*:* | ||
cpe:2.3:h:ruckuswireless:r310:-:*:*:*:*:*:*:* | ||
cpe:2.3:o:ruckuswireless:r500_firmware:10.5.1.0.199:*:*:*:*:*:*:* | ||
cpe:2.3:h:ruckuswireless:r500:-:*:*:*:*:*:*:* | ||
cpe:2.3:o:ruckuswireless:r600_firmware:10.5.1.0.199:*:*:*:*:*:*:* | ||
cpe:2.3:h:ruckuswireless:r600:-:*:*:*:*:*:*:* | ||
cpe:2.3:o:ruckuswireless:t300_firmware:10.5.1.0.199:*:*:*:*:*:*:* | ||
cpe:2.3:h:ruckuswireless:t300:-:*:*:*:*:*:*:* | ||
cpe:2.3:o:ruckuswireless:t301n_firmware:10.5.1.0.199:*:*:*:*:*:*:* | ||
cpe:2.3:h:ruckuswireless:t301n:-:*:*:*:*:*:*:* | ||
cpe:2.3:o:ruckuswireless:t301s_firmware:10.5.1.0.199:*:*:*:*:*:*:* | ||
cpe:2.3:h:ruckuswireless:t301s:-:*:*:*:*:*:*:* | ||
cpe:2.3:o:ruckuswireless:scg200_firmware:*:*:*:*:*:*:*:* | 3.6.2.0.795 (excluding) | |
cpe:2.3:h:ruckuswireless:scg200:-:*:*:*:*:*:*:* | ||
cpe:2.3:o:ruckuswireless:sz-100_firmware:*:*:*:*:*:*:*:* | 3.6.2.0.795 (excluding) |
To consult the complete list of CPE names with products and versions, see this page