Impact
The flaw permits an authenticated administrator to read any file that the device’s operating system can access via a command‑line interface. Access to arbitrary files can expose configuration settings, embedded credentials, and other privileged system data, elevating the risk of confidentiality loss. This weakness matches the established file‑read pattern identified as CWE‑552.
Affected Systems
Affected models include Ruckus Wireless RUCKUS Access Point, Ruckus Unleashed, SmartZone series devices such as SZ‑100, SZ‑144, and SZ‑300, and ZoneDirector 1200. The advisory does not specify firmware releases, so any current build of these listed products should be considered vulnerable.
Risk and Exploitability
The vulnerability carries a medium severity rating. Exploitation demands administrative access to the CLI, which is remote but requires prior authentication. No public evidence of exploitation exists and the weakness is not listed in the CISA catalog of widely used exploits. Nonetheless, an attacker who has gained legitimate credentials can read sensitive files, creating a potent foothold for further compromise.
OpenCVE Enrichment