exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

ZoneDirector Code Injection

ZoneDirector Code Injection
Posted Nov 12, 2013
Authored by Ruckus Product Security Team

A vulnerability has been discovered in ZoneDirector controllers (ZD) which may allow an attacker to inject malicious code via controller's admin web interface. The attacker needs access to an authenticated admin session with ZD's web interface for carrying out this attack. Affected software includes versions 9.3.x, 9.4.x, 9.5.x, and 9.6.x.

tags | advisory, web
SHA-256 | 62b972e7d6dbdf0c5f635f6e3a470a83f15461c4159ea625712a0156763d1448

ZoneDirector Code Injection

Change Mirror Download

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


RUCKUS ADVISORY ID 111113-1

Customer release date: Sep 9, 2013
Public release date: Nov 11, 2013

TITLE

Authenticated code injection vulnerability in ZoneDirector
administrative web interface


SUMMARY

A vulnerability has been discovered in ZoneDirector controllers (ZD)
which may allow an attacker to inject malicious code via controller's
admin web interface. The attacker needs access to an authenticated
admin session with ZD's web interface for carrying out this attack.


AFFECTED SOFTWARE VERSIONS AND DEVICES


Device Affected software
- -------------------------- ------------------
ZoneDirector Controllers 9.3.x, 9.4.x, 9.5.x, 9.6.x


Any products not mentioned in the table above are not affected


DETAILS

A weakness has been discovered in the administrative web interface of
the ZoneDirector controller devices. An attacker may abuse an
authenticated admin session with ZD's web interface for injecting
malicious code via controller's admin web interface. The pre-requisite
of this attack is that attacker has access to an authenticated admin
session with ZD's web interface. This issue does not affect any other
Ruckus devices besides ZoneDirector controllers.


IMPACT

An attacker may inject authenticated malicious code via the
administrative web interface of the ZoneDirector controller device.

CVSS v2 BASE METRIC SCORE: 7.9 (AV:N/AC:M/Au:S/C:C/I:C/A:N)


WORKAROUNDS

Ruckus recommends that all customers apply the appropriate patch(es)
as soon as practical for mitigating this attack. However, in the
event that a patch cannot immediately be applied, the following
suggestions might help reduce the risk:

- - - Only launch admin web sessions from trusted hosts with no
connectivity to untrusted networks such as the Internet while the
session is active.

- Do not expose management interfaces of Ruckus devices (including
administrative web interface) to untrusted networks such as the Internet.

- Use a firewall to limit traffic to/from ZoneDirector's
administrative web interface to trusted hosts.



SOLUTION

Ruckus recommends that all customers apply the appropriate patch(es)
as soon as practical.

The following patches have the fix (any later patches will also have
the fix):


Branch Software Patch
- - ------ ------------------
9.3.x 9.3.4.0.21
9.4.x 9.4.3.0.22
9.5.x 9.5.2.0.15
9.6.x 9.6.1.0.15


CREDITS

This vulnerability was reported by Erik van Eijk of Dutch Forensic
Institute, Netherlands.


OBTAINING FIXED FIRMWARE

Ruckus customers can obtain the fixed firmware from the support website at
https://support.ruckuswireless.com/

Ruckus Support can be contacted as follows:

1-855-RUCKUS1 (1-855-782-5871) (United States)

The full contact list is at:
https://support.ruckuswireless.com/contact-us


PUBLIC ANNOUNCEMENTS

This security advisory is strictly confidential and will be made
available for public consumption in approximately 60 days on Nov 11,
2013 at the following source

Ruckus Website
http://www.ruckuswireless.com/security

SecurityFocus Bugtraq
http://www.securityfocus.com/archive/1


Future updates of this advisory, if any, will be placed on Ruckus's
website, but may or may not be actively announced on mailing lists.

REVISION HISTORY

Revision 1.0 / 9th Sep 2013 / Initial release


RUCKUS WIRELESS SECURITY PROCEDURES

Complete information on reporting security vulnerabilities in Ruckus
Wireless
products, obtaining assistance with security incidents is available at
http://www.ruckuswireless.com/security


For reporting new security issues, email can be sent to
security(at)ruckuswireless.com
For sensitive information we encourage the use of PGP encryption. Our
public keys can be
found at http://www.ruckuswireless.com/security


STATUS OF THIS NOTICE: Final

Although Ruckus cannot guarantee the accuracy of all statements
in this advisory, all of the facts have been checked to the best of our
ability. Ruckus does not anticipate issuing updated versions of
this advisory unless there is some material change in the facts. Should
there be a significant change in the facts, Ruckus may update this
advisory.


(c) Copyright 2013 by Ruckus Wireless
This advisory may be redistributed freely after the public release
date given at
the top of the text, provided that redistributed copies are complete and
unmodified, including all date and version information.

-----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0.18 (Darwin)
Comment: GPGTools - http://gpgtools.org
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iQEcBAEBAgAGBQJSgXqpAAoJEFH6g5RLqzh1EqMIALNrshLMFkfNmt+3sCsBjwq5
zU0MwP4lM3ce35uKfVvMww6XMt/4HtVHiWonhdRo2uj5XelnZdQYxiV3EpxPc22B
pa1Go/c5toT+6qbbizGfm2SXHb37/JtBR6YogzZXo8uVNQzJg999E1UKJ//AleI7
xUz/rX3hOuyAXYGhZ/XPzepq1KRQf7gk/K4jNPixkqSScyziaE3HRsTC7pn6adxe
6TpEW2Ua1oQ2ATgXHEp3gFG1n9qZf3LPp4A20EgofuQAJ5Q5EgqcotIjl/vJVxPo
hKuL7l6ova2Fp4a4PlZN3cvtz0wF2JRs6WPqlP2oTzXakVLZ2fvv/URbnibp/GM=
=xVxn
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    0 Files
  • 17
    Apr 17th
    0 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close