CVE-2021-4474
Received Received - Intake
Arbitrary File Read in Ruckus AP CLI Exposes Sensitive Data

Publication date: 2026-03-26

Last updated on: 2026-03-26

Assigner: VulnCheck

Description
Ruckus Access Point products contain an arbitrary file read vulnerability in the command-line interface that allows authenticated remote attackers with administrative privileges to read arbitrary files from the underlying filesystem. Attackers can exploit this vulnerability to access sensitive information including configuration files, credentials, and system data stored on the device.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-26
Last Modified
2026-03-26
Generated
2026-05-07
AI Q&A
2026-03-26
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 7 associated CPEs
Vendor Product Version / Range
ruckus unleashed *
ruckus smartzone_100 *
ruckus smartzone_100-d *
ruckus smartzone_144 *
ruckus smartzone_144-dataplane *
ruckus smartzone_300 *
ruckus zonedirector_1200 *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-552 The product makes files or directories accessible to unauthorized actors, even though they should not be.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2021-4474 is an arbitrary file read vulnerability found in the command-line interface (CLI) of multiple Ruckus Access Point products. It allows authenticated remote attackers who have administrative privileges to read any file from the device's underlying filesystem.

Exploiting this vulnerability enables attackers to access sensitive information such as configuration files, credentials, and system data stored on the affected device.


How can this vulnerability impact me? :

This vulnerability can lead to unauthorized disclosure of sensitive information stored on Ruckus Access Point devices. Attackers with administrative credentials can read arbitrary files, potentially exposing configuration details, user credentials, and other critical system data.

Such exposure can compromise network security by allowing attackers to gather information that could be used for further attacks or unauthorized access.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability exists in the command-line interface (CLI) of Ruckus Access Point products and requires authenticated administrative access to exploit. Detection would involve verifying if unauthorized or suspicious CLI commands are being executed that attempt to read arbitrary files from the device filesystem.

Since the vulnerability allows arbitrary file read via CLI by authenticated administrators, monitoring CLI access logs for unusual file read commands or attempts to access sensitive configuration files could help detect exploitation attempts.

Specific commands to detect exploitation are not provided in the available resources.


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include restricting administrative CLI access to trusted personnel only, ensuring strong authentication mechanisms are in place, and monitoring for any unauthorized CLI activity.

Since the vulnerability requires administrative privileges, limiting the number of users with such privileges and enforcing strict access controls can reduce the risk of exploitation.

No specific remediation or patch information is provided in the available resources, so contacting Ruckus support or checking for official security bulletins for patches or updates is recommended.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability allows authenticated remote attackers with administrative privileges to read arbitrary files from the device's filesystem, potentially exposing sensitive information such as configuration files, credentials, and system data.

This unauthorized disclosure of sensitive information could lead to non-compliance with data protection regulations and standards like GDPR and HIPAA, which require the protection of sensitive data against unauthorized access.

Since the vulnerability requires administrative authentication, it implies that compromised credentials or insider threats could exploit this flaw, increasing the risk of sensitive data exposure and regulatory violations.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart