Ruckus vRioT through 1.5.1.0.21 has an API backdoor that is hardcoded into validate_token.py. An unauthenticated attacker can interact with the service API by using a backdoor value as the Authorization header.
Source: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26879
Reference (s):
- https://support.ruckuswireless.com/security_bulletins/305
- https://adepts.of0x.cc
- https://adepts.of0x.cc/ruckus-vriot-rce/
- https://support.ruckuswireless.com/documents
- https://twitter.com/TheXC3LL

