CVE-2021-4474
Arbitrary File Read in Ruckus AP CLI Exposes Sensitive Data
Publication date: 2026-03-26
Last updated on: 2026-03-26
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| ruckus | unleashed | * |
| ruckus | smartzone_100 | * |
| ruckus | smartzone_100-d | * |
| ruckus | smartzone_144 | * |
| ruckus | smartzone_144-dataplane | * |
| ruckus | smartzone_300 | * |
| ruckus | zonedirector_1200 | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-552 | The product makes files or directories accessible to unauthorized actors, even though they should not be. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2021-4474 is an arbitrary file read vulnerability found in the command-line interface (CLI) of multiple Ruckus Access Point products. It allows authenticated remote attackers who have administrative privileges to read any file from the device's underlying filesystem.
Exploiting this vulnerability enables attackers to access sensitive information such as configuration files, credentials, and system data stored on the affected device.
How can this vulnerability impact me? :
This vulnerability can lead to unauthorized disclosure of sensitive information stored on Ruckus Access Point devices. Attackers with administrative credentials can read arbitrary files, potentially exposing configuration details, user credentials, and other critical system data.
Such exposure can compromise network security by allowing attackers to gather information that could be used for further attacks or unauthorized access.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability exists in the command-line interface (CLI) of Ruckus Access Point products and requires authenticated administrative access to exploit. Detection would involve verifying if unauthorized or suspicious CLI commands are being executed that attempt to read arbitrary files from the device filesystem.
Since the vulnerability allows arbitrary file read via CLI by authenticated administrators, monitoring CLI access logs for unusual file read commands or attempts to access sensitive configuration files could help detect exploitation attempts.
Specific commands to detect exploitation are not provided in the available resources.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include restricting administrative CLI access to trusted personnel only, ensuring strong authentication mechanisms are in place, and monitoring for any unauthorized CLI activity.
Since the vulnerability requires administrative privileges, limiting the number of users with such privileges and enforcing strict access controls can reduce the risk of exploitation.
No specific remediation or patch information is provided in the available resources, so contacting Ruckus support or checking for official security bulletins for patches or updates is recommended.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability allows authenticated remote attackers with administrative privileges to read arbitrary files from the device's filesystem, potentially exposing sensitive information such as configuration files, credentials, and system data.
This unauthorized disclosure of sensitive information could lead to non-compliance with data protection regulations and standards like GDPR and HIPAA, which require the protection of sensitive data against unauthorized access.
Since the vulnerability requires administrative authentication, it implies that compromised credentials or insider threats could exploit this flaw, increasing the risk of sensitive data exposure and regulatory violations.