In Ruckus R310 10.5.1.0.199, Ruckus R500 10.5.1.0.199, Ruckus R600 10.5.1.0.199, Ruckus T300 10.5.1.0.199, Ruckus T301n 10.5.1.0.199, Ruckus T301s 10.5.1.0.199, SmartCell Gateway 200 (SCG200) before 3.6.2.0.795, SmartZone 100 (SZ-100) before 3.6.2.0.795, SmartZone 300 (SZ300) before 3.6.2.0.795, Virtual SmartZone (vSZ) before 3.6.2.0.795, ZoneDirector 1100 9.10.2.0.130, ZoneDirector 1200 10.2.1.0.218, ZoneDirector 3000 10.2.1.0.218, ZoneDirector 5000 10.0.1.0.151, a vulnerability allows attackers to force bypass Secure Boot failed attempts and run temporarily the previous Backup image.
| Software | From | Fixed in |
|---|---|---|
| ruckuswireless / r310_firmware | 10.5.1.0.199 | 10.5.1.0.199.x |
| ruckuswireless / r500_firmware | 10.5.1.0.199 | 10.5.1.0.199.x |
| ruckuswireless / r600_firmware | 10.5.1.0.199 | 10.5.1.0.199.x |
| ruckuswireless / t300_firmware | 10.5.1.0.199 | 10.5.1.0.199.x |
| ruckuswireless / t301n_firmware | 10.5.1.0.199 | 10.5.1.0.199.x |
| ruckuswireless / t301s_firmware | 10.5.1.0.199 | 10.5.1.0.199.x |
| ruckuswireless / scg200_firmware | - | 3.6.2.0.795 |
| ruckuswireless / sz-100_firmware | - | 3.6.2.0.795 |
| ruckuswireless / sz-300_firmware | - | 3.6.2.0.795 |
| ruckuswireless / vsz_firmware | - | 3.6.2.0.795 |
| ruckuswireless / zonedirector_1100_firmware | 9.10.2.0.130 | 9.10.2.0.130.x |
| ruckuswireless / zonedirector_1200_firmware | 10.2.1.0.218 | 10.2.1.0.218.x |
| ruckuswireless / zonedirector_3000_firmware | 10.2.1.0.218 | 10.2.1.0.218.x |
| ruckuswireless / zonedirector_5000_firmware | 10.0.1.0.151 | 10.0.1.0.151.x |