U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2019-19839

Change History

Initial Analysis by NIST 1/23/2020 4:55:45 PM

Action Type Old Value New Value
Added CVSS V3.1

								
							
							
						
NIST AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Added CVSS V2

								
							
							
						
NIST (AV:N/AC:L/Au:N/C:C/I:C/A:C)
Added CWE

								
							
							
						
NIST CWE-78
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:ruckuswireless:unleashed:*:*:*:*:*:*:*:* versions up to (excluding) 200.7.10.202.94
     OR
          cpe:2.3:h:ruckuswireless:c110:-:*:*:*:*:*:*:*
          cpe:2.3:h:ruckuswireless:e510:-:*:*:*:*:*:*:*
          cpe:2.3:h:ruckuswireless:h320:-:*:*:*:*:*:*:*
          cpe:2.3:h:ruckuswireless:h510:-:*:*:*:*:*:*:*
          cpe:2.3:h:ruckuswireless:m510:-:*:*:*:*:*:*:*
          cpe:2.3:h:ruckuswireless:r310:-:*:*:*:*:*:*:*
          cpe:2.3:h:ruckuswireless:r320:-:*:*:*:*:*:*:*
          cpe:2.3:h:ruckuswireless:r510:-:*:*:*:*:*:*:*
          cpe:2.3:h:ruckuswireless:r610:-:*:*:*:*:*:*:*
          cpe:2.3:h:ruckuswireless:r710:-:*:*:*:*:*:*:*
          cpe:2.3:h:ruckuswireless:r720:-:*:*:*:*:*:*:*
          cpe:2.3:h:ruckuswireless:t310:-:*:*:*:*:*:*:*
          cpe:2.3:h:ruckuswireless:t610:-:*:*:*:*:*:*:*
          cpe:2.3:h:ruckuswireless:t710:-:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:ruckuswireless:zonedirector_1200_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 9.10.2.0.84
          *cpe:2.3:o:ruckuswireless:zonedirector_1200_firmware:*:*:*:*:*:*:*:* versions from (including) 9.12.0 up to (excluding) 9.12.3.0.136
          *cpe:2.3:o:ruckuswireless:zonedirector_1200_firmware:*:*:*:*:*:*:*:* versions from (including) 9.13.0 up to (excluding) 10.0.1.0.90
          *cpe:2.3:o:ruckuswireless:zonedirector_1200_firmware:*:*:*:*:*:*:*:* versions from (including) 10.1.0 up to (excluding) 10.1.2.0.275
          *cpe:2.3:o:ruckuswireless:zonedirector_1200_firmware:*:*:*:*:*:*:*:* versions from (including) 10.2.0 up to (excluding) 10.2.1.0.147
          *cpe:2.3:o:ruckuswireless:zonedirector_1200_firmware:*:*:*:*:*:*:*:* versions from (including) 10.3.0 up to (excluding) 10.3.1.0.21
     OR
          cpe:2.3:h:ruckuswireless:zonedirector_1200:-:*:*:*:*:*:*:*
Changed Reference Type
https://alephsecurity.com/2020/01/14/ruckus-wireless No Types Assigned
https://alephsecurity.com/2020/01/14/ruckus-wireless Exploit, Technical Description, Third Party Advisory
Changed Reference Type
https://fahrplan.events.ccc.de/congress/2019/Fahrplan/events/10816.html No Types Assigned
https://fahrplan.events.ccc.de/congress/2019/Fahrplan/events/10816.html Third Party Advisory
Changed Reference Type
https://www.ruckuswireless.com/security/299/view/txt No Types Assigned
https://www.ruckuswireless.com/security/299/view/txt Vendor Advisory