#VU25252 Improper Authentication in Ruckus IoT vRIoT Server - CVE-2020-8005
Published: February 11, 2020
Ruckus IoT vRIoT Server
Ruckus Networks
Description
The vulnerability allows a remote attacker to compromise the affected device.
The vulnerability exists due to absent authentication at multiple API endpoint. A remote non-authenticated attacker can use the exposed APIs to download or delete system backups, manipulate modules configuration, reset the device.
Successful exploitation of the vulnerability may allow an attacker to compromise the affected device.
Examples of exposed APIs without authentication:
/service/init/service/v1/db/restore/service/v1/db/backup/service/upgrade/flow/module//reset