CVE-2021-36630
CVSS V2 None
CVSS V3 None
Description
DDOS reflection amplification vulnerability in eAut module of Ruckus Wireless SmartZone controller that allows remote attackers to perform DOS attacks via crafted request.
Overview
- CVE ID
- CVE-2021-36630
- Assigner
- cve@mitre.org
- Vulnerability Status
- Analyzed
- Published Version
- 2023-01-18T13:15:12
- Last Modified Date
- 2023-01-31T19:02:50
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
AND | ||||
cpe:2.3:o:commscope:ruckus_smartzone_z300_firmware:-:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:h:commscope:ruckus_smartzone_z300:-:*:*:*:*:*:*:* | 0 | OR | ||
AND | ||||
cpe:2.3:o:commscope:ruckus_smartzone_z144_firmware:-:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:h:commscope:ruckus_smartzone_z144:-:*:*:*:*:*:*:* | 0 | OR | ||
AND | ||||
cpe:2.3:o:commscope:ruckus_smartzone_z100_firmware:-:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:h:commscope:ruckus_smartzone_z100:-:*:*:*:*:*:*:* | 0 | OR | ||
AND | ||||
cpe:2.3:a:commscope:ruckus_virtual_smartzone:-:*:*:*:*:*:*:* | 1 | OR |
References
Reference URL | Reference Tags |
---|---|
http://ruckus.com | Not Applicable |
http://smartzone-100.com | Broken Link |
https://anquan.baidu.com/article/1434 | Exploit Mitigation Technical Description Third Party Advisory |
https://github.com/lixiang957/CVE-2021-36630 | Exploit Third Party Advisory |
https://www.commscope.com/globalassets/digizuite/921070-faq-security-advisory-id-20210719-v1-0.pdf | |
https://www.freebuf.com/articles/web/260338.html |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2021-36630 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36630 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2023-01-18 14:15:45 | Added to TrackCVE | |||
2023-01-23 17:13:55 | 2023-01-23T16:15:10 | CVE Modified Date | updated | |
2023-01-23 17:13:56 | References | updated | ||
2023-01-25 14:13:21 | Awaiting Analysis | Undergoing Analysis | Vulnerability Status | updated |
2023-01-26 15:13:40 | 2023-01-26T14:52:45 | CVE Modified Date | updated | |
2023-01-26 15:13:40 | Undergoing Analysis | Analyzed | Vulnerability Status | updated |
2023-01-26 15:13:40 | Weakness Enumeration | new | ||
2023-01-26 15:13:41 | CPE Information | updated | ||
2023-01-27 20:15:16 | 2023-01-27T19:15:08 | CVE Modified Date | updated | |
2023-01-27 20:15:16 | Analyzed | Modified | Vulnerability Status | updated |
2023-01-27 20:15:18 | References | updated | ||
2023-01-30 17:14:46 | Modified | Undergoing Analysis | Vulnerability Status | updated |
2023-01-31 19:13:15 | 2023-01-31T19:02:50 | CVE Modified Date | updated | |
2023-01-31 19:13:15 | Undergoing Analysis | Analyzed | Vulnerability Status | updated |