Ruckus vRioT through 1.5.1.0.21 has an API backdoor that is hardcoded into validate_token.py. An unauthenticated attacker can interact with the service API by using a backdoor value as the Authorization header.
References
Link Resource
https://adepts.of0x.cc Third Party Advisory
https://adepts.of0x.cc/ruckus-vriot-rce/ Exploit Third Party Advisory
https://support.ruckuswireless.com/documents Vendor Advisory
https://support.ruckuswireless.com/security_bulletins/305 Product Vendor Advisory
https://twitter.com/TheXC3LL Third Party Advisory
https://x-c3ll.github.io Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2020-10-26T19:20:44

Updated: 2020-10-26T19:20:44

Reserved: 2020-10-07T00:00:00


Link: CVE-2020-26879

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2020-10-26T20:15:14.537

Modified: 2020-11-02T18:25:51.083


Link: CVE-2020-26879

JSON object: View

cve-icon Redhat Information

No data.

CWE