A cross-site-scripting vulnerability exists in Ruckus Access Point products (ZoneDirector, SmartZone, and AP Solo). If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who is logging in the product. As for the affected products/models/versions, see the information provided by the vendor listed under [References] section or the list under [Product Status] section.
References
Link Resource
https://jvn.jp/en/jp/JVN45891816/ Third Party Advisory
https://support.ruckuswireless.com/security_bulletins/323 Patch Vendor Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: jpcert

Published: 2023-12-07T06:22:32.328Z

Updated: 2023-12-07T06:22:32.328Z

Reserved: 2023-11-24T00:19:52.591Z


Link: CVE-2023-49225

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2023-12-07T07:15:12.880

Modified: 2023-12-12T17:04:37.617


Link: CVE-2023-49225

JSON object: View

cve-icon Redhat Information

No data.

CWE