Vulnerability Note VU#742932
Ruckus Wireless Zoneflex 2942 Wireless Access Point vulnerable to authentication bypass
Ruckus Wireless Zoneflex 2942 Wireless Access Point version 126.96.36.199.267 and possibly earlier versions contains an authentication bypass vulnerability (CWE-592).
CWE-592: Authentication Bypass Issues
Ruckus Wireless Zoneflex 2942 Wireless Access Point version 188.8.131.52.267 contains an authentication bypass vulnerability. A local unauthenticated attacker may attempt to login with any credentials and after receiving the authentication failure message, the user can remove the /login.asp portion of the URI to bypass the login page. The attacker will not be able to browse to the other configuration pages of the device via the graphical user interface, but they can then manually edit the URI to gain access to the following pages:
An unauthenticated attacker may be able to directly access the device's configuration web pages. The attacker may also be able to reboot the access point, resulting in a denial of service.
We are currently unaware of a practical solution to this problem. Please consider the following workarounds.
Restrict network access
Vendor Information (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Ruckus Wireless||Affected||19 Aug 2013||03 Oct 2013|
CVSS Metrics (Learn More)
Thanks to MyExploit for reporting this vulnerability.
This document was written by Adam Rauf.
- CVE IDs: CVE-2013-5030
- Date Public: 10 Oct 2013
- Date First Published: 10 Oct 2013
- Date Last Updated: 10 Oct 2013
- Document Revision: 17
If you have feedback, comments, or additional information about this vulnerability, please send us email.