Ruckus.IoT.Controller.Web.UI.createUser.Command.Injection

description-logoDescription

This indicates an attack attempt to exploit a Command Injection Vulnerability in Ruckus IoT Controller.
The vulnerability is due to improperly handling of a crafted HTTP request. A remote authenticated attacker could exploit the vulnerability by sending crafted HTTP requests to the target server. Successful exploitation could lead to arbitrary command execution in the context of the root user.

affected-products-logoAffected Products

Ruckus IoT Controller 1.5.1.0.21 and prior

Impact logoImpact

System Compromise: Remote attackers can gain control of vulnerable systems.

recomended-action-logoRecommended Actions

Apply the most recent upgrade or patch from the vendor.
https://support.ruckuswireless.com/security_bulletins/305

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)

Version Updates

Date Version Detail
2020-11-26 16.969 Default_action:pass:drop
2020-11-17 16.963