7.5
CVE-2021-36630
- EPSS 12.73%
- Veröffentlicht 18.01.2023 13:15:12
- Zuletzt bearbeitet 04.04.2025 16:15:15
- Quelle cve@mitre.org
- Teams Watchlist Login
- Unerledigt Login
DDOS reflection amplification vulnerability in eAut module of Ruckus Wireless SmartZone controller that allows remote attackers to perform DOS attacks via crafted request.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Ruckuswireless ≫ Sz-300 Firmware Version <= 3.6.2
Ruckuswireless ≫ Sz-144 Firmware Version <= 3.6.2
Ruckuswireless ≫ Sz-100 Firmware Version <= 3.6.2
Ruckuswireless ≫ Vsz Firmware Version <= 3.6.2
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 12.73% | 0.934 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 7.5 | 3.9 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
|
134c704f-9b21-4f2e-91b3-4a467353bcc0 | 7.5 | 3.9 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
|
CWE-770 Allocation of Resources Without Limits or Throttling
The product allocates a reusable resource or group of resources on behalf of an actor without imposing any restrictions on the size or number of resources that can be allocated, in violation of the intended security policy for that actor.