Month: January 2015

Unauthenticated TCP tunneling on Ruckus devices via SSH server process

Posted on 30 Jan, 2015, in Uncategorized

An user authentication bypass vulnerability has been discovered during standard internal bug reporting procedures in some of the Ruckus devices. This vulnerability may permit an unauthenticated malicious user with network access to port 22 to tunnel random TCP traffic to other hosts on the network via Ruckus devices.