Intrusion Prevention



This indicates an attack attempt to exploit an Authentication Bypass Vulnerability in Ruckus IoT Controller.
The vulnerability is due to improperly handling of a crafted HTTP request. A remote, unauthenticated attacker could exploit the vulnerability by sending crafted HTTP requests to the target server. Successful exploitation can result in authentication bypass.

Affected Products

Ruckus IoT Controller and prior


System Compromise: Remote attackers can gain control of vulnerable systems.

Recommended Actions

Apply the most recent upgrade or patch from the vendor.

CVE References