CVE-2020-22660

In Ruckus R310 10.5.1.0.199, Ruckus R500 10.5.1.0.199, Ruckus R600 10.5.1.0.199, Ruckus T300 10.5.1.0.199, Ruckus T301n 10.5.1.0.199, Ruckus T301s 10.5.1.0.199, SmartCell Gateway 200 (SCG200) before 3.6.2.0.795, SmartZone 100 (SZ-100) before 3.6.2.0.795, SmartZone 300 (SZ300) before 3.6.2.0.795, Virtual SmartZone (vSZ) before 3.6.2.0.795, ZoneDirector 1100 9.10.2.0.130, ZoneDirector 1200 10.2.1.0.218, ZoneDirector 3000 10.2.1.0.218, ZoneDirector 5000 10.0.1.0.151, a vulnerability allows attackers to force bypass Secure Boot failed attempts and run temporarily the previous Backup image.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:ruckuswireless:r310_firmware:10.5.1.0.199:*:*:*:*:*:*:*
cpe:2.3:h:ruckuswireless:r310:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:ruckuswireless:r500_firmware:10.5.1.0.199:*:*:*:*:*:*:*
cpe:2.3:h:ruckuswireless:r500:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:ruckuswireless:r600_firmware:10.5.1.0.199:*:*:*:*:*:*:*
cpe:2.3:h:ruckuswireless:r600:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:ruckuswireless:t300_firmware:10.5.1.0.199:*:*:*:*:*:*:*
cpe:2.3:h:ruckuswireless:t300:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:ruckuswireless:t301n_firmware:10.5.1.0.199:*:*:*:*:*:*:*
cpe:2.3:h:ruckuswireless:t301n:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:ruckuswireless:t301s_firmware:10.5.1.0.199:*:*:*:*:*:*:*
cpe:2.3:h:ruckuswireless:t301s:-:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:ruckuswireless:scg200_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:ruckuswireless:scg200:-:*:*:*:*:*:*:*

Configuration 8 (hide)

AND
cpe:2.3:o:ruckuswireless:sz-100_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:ruckuswireless:sz-100:-:*:*:*:*:*:*:*

Configuration 9 (hide)

AND
cpe:2.3:o:ruckuswireless:sz-300_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:ruckuswireless:sz-300:-:*:*:*:*:*:*:*

Configuration 10 (hide)

AND
cpe:2.3:o:ruckuswireless:vsz_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:ruckuswireless:vsz:-:*:*:*:*:*:*:*

Configuration 11 (hide)

AND
cpe:2.3:o:ruckuswireless:zonedirector_1100_firmware:9.10.2.0.130:*:*:*:*:*:*:*
cpe:2.3:h:ruckuswireless:zonedirector_1100:-:*:*:*:*:*:*:*

Configuration 12 (hide)

AND
cpe:2.3:o:ruckuswireless:zonedirector_1200_firmware:10.2.1.0.218:*:*:*:*:*:*:*
cpe:2.3:h:ruckuswireless:zonedirector_1200:-:*:*:*:*:*:*:*

Configuration 13 (hide)

AND
cpe:2.3:o:ruckuswireless:zonedirector_3000_firmware:10.2.1.0.218:*:*:*:*:*:*:*
cpe:2.3:h:ruckuswireless:zonedirector_3000:-:*:*:*:*:*:*:*

Configuration 14 (hide)

AND
cpe:2.3:o:ruckuswireless:zonedirector_5000_firmware:10.0.1.0.151:*:*:*:*:*:*:*
cpe:2.3:h:ruckuswireless:zonedirector_5000:-:*:*:*:*:*:*:*

History

06 Aug 2024, 21:16

Type Values Removed Values Added
New CVE

Information

Published : 2023-01-20 19:15

Updated : 2024-08-06 21:16


NVD link : CVE-2020-22660

Mitre link : CVE-2020-22660

CVE.ORG link : CVE-2020-22660


JSON object : View

Products Affected

ruckuswireless

  • zonedirector_5000_firmware
  • sz-300_firmware
  • r500
  • r500_firmware
  • zonedirector_1200_firmware
  • zonedirector_5000
  • zonedirector_1100_firmware
  • t301n_firmware
  • scg200_firmware
  • sz-100_firmware
  • scg200
  • zonedirector_3000
  • zonedirector_1200
  • t300_firmware
  • r600_firmware
  • r310
  • r600
  • zonedirector_3000_firmware
  • zonedirector_1100
  • vsz
  • t301s
  • t300
  • t301n
  • vsz_firmware
  • sz-100
  • t301s_firmware
  • sz-300
  • r310_firmware