Description
Ruckus Access Point products contain an arbitrary file read vulnerability in the command-line interface that allows authenticated remote attackers with administrative privileges to read arbitrary files from the underlying filesystem. Attackers can exploit this vulnerability to access sensitive information including configuration files, credentials, and system data stored on the device.
Published: 2026-03-26
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote file read enabling confidentiality breach
Action: Immediate patch
AI Analysis

Impact

The flaw permits an authenticated administrator to read any file that the device’s operating system can access via a command‑line interface. Access to arbitrary files can expose configuration settings, embedded credentials, and other privileged system data, elevating the risk of confidentiality loss. This weakness matches the established file‑read pattern identified as CWE‑552.

Affected Systems

Affected models include Ruckus Wireless RUCKUS Access Point, Ruckus Unleashed, SmartZone series devices such as SZ‑100, SZ‑144, and SZ‑300, and ZoneDirector 1200. The advisory does not specify firmware releases, so any current build of these listed products should be considered vulnerable.

Risk and Exploitability

The vulnerability carries a medium severity rating. Exploitation demands administrative access to the CLI, which is remote but requires prior authentication. No public evidence of exploitation exists and the weakness is not listed in the CISA catalog of widely used exploits. Nonetheless, an attacker who has gained legitimate credentials can read sensitive files, creating a potent foothold for further compromise.

Generated by OpenCVE AI on March 26, 2026 at 20:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply vendor firmware or software updates that fix the CLI read flaw.
  • Limit CLI administrative access to trusted networks or specific IP addresses wherever possible.
  • Enforce strong authentication mechanisms, including multi‑factor authentication, for all administrative credentials.
  • Enable logging of CLI activity and regularly review logs for anomalous file‑read operations.

Generated by OpenCVE AI on March 26, 2026 at 20:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 27 Mar 2026 08:45:00 +0000

Type Values Removed Values Added
First Time appeared Ruckus
Ruckus ruckus Unleashed
Ruckus smartzone 100-d (sz100-d) (eol)
Ruckus smartzone 100 (sz-100) (eol)
Ruckus smartzone 144-dataplane (sz144-d)
Ruckus smartzone 144 (sz-144)
Ruckus smartzone 300 (sz300) (eol)
Ruckus zonedirector 1200 (eol)
Ruckuswireless
Ruckuswireless ruckus Access Point
Vendors & Products Ruckus
Ruckus ruckus Unleashed
Ruckus smartzone 100-d (sz100-d) (eol)
Ruckus smartzone 100 (sz-100) (eol)
Ruckus smartzone 144-dataplane (sz144-d)
Ruckus smartzone 144 (sz-144)
Ruckus smartzone 300 (sz300) (eol)
Ruckus zonedirector 1200 (eol)
Ruckuswireless
Ruckuswireless ruckus Access Point

Thu, 26 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 26 Mar 2026 19:45:00 +0000

Type Values Removed Values Added
Description Ruckus Access Point products contain an arbitrary file read vulnerability in the command-line interface that allows authenticated remote attackers with administrative privileges to read arbitrary files from the underlying filesystem. Attackers can exploit this vulnerability to access sensitive information including configuration files, credentials, and system data stored on the device.
Title Ruckus AP CLI Arbitrary File Read Allows Authenticated Remote File Access
Weaknesses CWE-552
References
Metrics cvssV3_1

{'score': 4.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Ruckus Ruckus Unleashed Smartzone 100-d (sz100-d) (eol) Smartzone 100 (sz-100) (eol) Smartzone 144-dataplane (sz144-d) Smartzone 144 (sz-144) Smartzone 300 (sz300) (eol) Zonedirector 1200 (eol)
Ruckuswireless Ruckus Access Point
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-26T19:57:52.098Z

Reserved: 2026-03-23T17:39:23.925Z

Link: CVE-2021-4474

cve-icon Vulnrichment

Updated: 2026-03-26T19:57:12.924Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-26T20:16:07.730

Modified: 2026-03-30T13:26:50.827

Link: CVE-2021-4474

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-27T09:25:29Z

Weaknesses