Ruckus Wireless ICX Switches Cross-site Scripting (CVE-2013-6786)

medium Tenable OT Security Plugin ID 503335

Synopsis

The remote OT asset is affected by a vulnerability.

Description

Due to a Cross-site scripting (XSS) vulnerability, by requesting a nonexistent URI in a crafted HTTP Referrer header, arbitrary web scripts or HTML can be injected to the Ruckus FastIron device's web server.

This plugin only works with Tenable.ot.
Please visit https://www.tenable.com/products/tenable-ot for more information.

Solution

Refer to the vendor advisory.

See Also

https://support.ruckuswireless.com/security_bulletins/276

Plugin Details

Severity: Medium

ID: 503335

Version: 1.1

Type: remote

Family: Tenable.ot

Published: 9/29/2025

Updated: 9/29/2025

Supported Sensors: Tenable OT Security

Risk Information

VPR

Risk Factor: Low

Score: 2.2

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

CVSS Score Source: CVE-2013-6786

CVSS v3

Risk Factor: Medium

Base Score: 4.3

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N

Vulnerability Information

CPE: cpe:/o:ruckussecurity:icx7250_series_firmware:-, cpe:/o:ruckussecurity:icx7650_series_firmware:-, cpe:/o:ruckussecurity:icx6430_series_firmware:-, cpe:/o:ruckussecurity:icx7750_series_firmware:-, cpe:/o:ruckussecurity:icx7150_series_firmware:-, cpe:/o:ruckussecurity:icx6610_series_firmware:-, cpe:/o:ruckussecurity:icx6450_series_firmware:-, cpe:/o:ruckussecurity:icx7450_series_firmware:-

Required KB Items: Tenable.ot/RuckusWireless

Exploit Ease: No known exploits are available

Patch Publication Date: 2/26/2018

Vulnerability Publication Date: 2/26/2018

Reference Information

CVE: CVE-2013-6786

CWE: 79