Sicurezza

Ruckus e la gestione della vulnerabilità WPA2 (KRACK):
Centro risorse Ruckus per l’assistenza wireless

Il Team preposto alla sicurezza dei prodotti Ruckus si occupa della ricerca, dell’analisi e della gestione delle segnalazioni di incidenti di sicurezza legati ai prodotti Ruckus. Questo team rappresenta il primo punto di contatto per tutte le segnalazioni di incidenti di sicurezza e lavora direttamente con clienti Ruckus, ricercatori in materia di sicurezza, organizzazioni governative, consulenti, organismi di sicurezza del settore, nonché altri fornitori, allo scopo di identificare i problemi di sicurezza relativi ai prodotti Ruckus. Il team è inoltre responsabile della pubblicazione di avvisi di sicurezza e della comunicazione con organismi esterni riguardo le misure di contenimento da intraprendere per risolvere particolari problemi di sicurezza legati ai prodotti Ruckus.

Segnalazione di un problema di sicurezza a Ruckus

Ruckus incoraggia sia i singoli individui che le organizzazioni a segnalare tutte le vulnerabilità e i problemi di sicurezza legati ai suoi prodotti direttamente a Ruckus utilizzando l’email alias: [email protected].

Il link alla Politica di Ruckus in materia di gestione degli incidenti di sicurezza è disponibile qui.

Fornisci una descrizione dettagliata del problema insieme alle informazioni necessarie a consentire a Ruckus di riprodurre il problema. Includi inoltre un contatto tecnico, l’elenco di tutti i prodotti Ruckus coinvolti e qualsiasi altra informazione utile, come ad esempio log e messaggi su console, ecc.

Se è attualmente in atto un’interruzione di rete o se hai bisogno di aiuto per la configurazione di una funzione di sicurezza, contatta Ruckus utilizzando uno qualsiasi dei metodi indicati alla pagina https://support.ruckuswireless.com/contact-us

Ruckus raccomanda vivamente di proteggere le comunicazioni e-mail con la chiave PGP sottostante atta a crittografare eventuali dati sensibili inviati a Ruckus.

Per inviare informazioni riservate, utilizza sempre e solamente chiavi PGP. Per richiedere informazioni sulle chiavi e le chiavi stesse, invia un’e-mail a [email protected].

Bollettini di sicurezza

ID Title Version Release Date Edit Date FAQ
20180203 Java JMX and RMI security vulnerabilities CVE-2017-15708 and CVE-2016-8735 1.1 February 13, 2018 February 13, 2018 Download FAQ PDF
20180202 Authenticated Root Command Injection Vulnerabilities in CLI of ZD/Unleashed APs and Web-GUI of Solo/SZ Managed APs (CVE02017-6229, CVE-2017-6230) 1 February 05, 2018 February 05, 2018 Download FAQ PDF
20180116 Intel ME impersonation security vulnerabilities 1.0 January 16, 2018 January 16, 2018 Download FAQ PDF
20180105 Spectre and Meltdown Vulnerabilities – CVE-2017-5753 CVE-2017-5715 & CVE-2017-5754 1.1 January 5, 2018 January 10, 2018 Download FAQ PDF
112717 Multiple Vulnerabilities in DNSMASQ (CVE-2017-14491, CVE-2017-14492, CVE-2017-14493, CVE-2017-14494, CVE-2017-14495, CVE-2017-14496, CVE-2017-13704, CVE-2015-3294) 1.0 November 27, 2017 November 27, 2017 Download FAQ PDF
101717 Multiple Vulnerabilities discovered in RSA key generation within Infineon TPM 1.1 October 17, 2017 October 17, 2017 Download FAQ PDF
101617 Multiple Vulnerabilities discovered in 4-way handshake of WPA2 protocols - (KRACK: CVE-2017-13077, CVE-2017-13078, CVE-2017-13079, CVE-2017-13080, CVE-2017-13081, CVE-2017-13082, CVE-2017-13084, CVE-2017-13086, CVE-2017-13087, CVE-2017-13088) 1.6 October 16, 2017 November 7, 2017 Download FAQ PDF
092917 Authenticated Root Command Injection Vulnerabilities in Web-GUI of Ruckus Zone Director Controller and Unleashed APs (CVE-2017-6223, CVE-2017-6224) 1.0 September 29, 2017 September 29, 2017 Download FAQ PDF
072817 Vulnerabilities updates for RC4(CVE-2013-2566, CVE-2015-2808), SWEET32 (CVE-2016-2183) and SSL certificate signed using weak hashing algorithm (CVE-2004-2761) 1.0 July 28, 2017 July 28, 2017 Download FAQ PDF
062117 Vulnerabilities in Web GUI Interface on Ruckus Unmanaged-APs – CVE-2016-1000213, CVE-2016-1000214, CVE-2016-1000215, CVE-2016-1000216 1.0 June 21, 2017 June 21, 2017 Download FAQ PDF
030117 Vulnerabilities in Dropbear SSH – CVE-2016-7406, CVE-2016-7407, CVE- 2016-2408, CVE-2016-2409 1.0 March 01, 2017 March 01, 2017 Download FAQ PDF
022717 Vulnerabilities in OpenSSL – CVE-2017-3730, CVE-2017-3731, CVE-2017- 3732, CVE-2016-6304, CVE-2016-6305 1.0 February 27, 2017 February 27, 2017 Download FAQ PDF
111116 Linux Kernel Local Privilege Escalation "Dirty Cow" - CVE-2016-5195 1.0 November 11, 2016 November 11, 2016 Download FAQ PDF
081516 Linux TCP Flaw - CVE-2016-5696 1.0 August 15, 2016 August 15, 2016 Download FAQ PDF
080216 Vulnerabilities in WebGUI Interface on Ruckus Unmanaged-APs 1.0 August 2, 2016 August 2, 2016 Download FAQ PDF
071216 Vulnerabilities in OpenSSL and Related Updates - CVE-2016-2108, CVE-2016-2107, CVE-2016-2105, CVE-2016-2106, CVE-2016-2109, CVE-2016-2176 1.0 July 12, 2016 July 12, 2016 Download FAQ PDF
051616 Vulnerabilities in OpenSSL and Related Updates - CVE-2016-0800, CVE-2016-0705, CVE-2016-0798, CVE-2016-0797, CVE-2016-0799, CVE-2016-0702, CVE-2016-0703, CVE-2016-0704 1.0 May 16, 2016 May 16, 2016 Download FAQ PDF
022916 Vulnerabilities in Linux GNU C (libc) Distributions - CVE-2015-7547 1.0 February 29, 2016 February 29, 2016 Download FAQ PDF
123015 Vulnerabilities in OpenSSL Distributions - CVE-2015-3193, CVE-2015-3194, CVE-2015-3195, CVE-2015-3196 1.0 December 30, 2015 December 30, 2015 Download FAQ PDF
090315 Vulnerabilities in OpenSSH Distributions - CVE-2015-5600, CVE-2015-6563, CVE-2015-6564 1.0 September 3, 2015 September 3, 2015 Download FAQ PDF
072115 X509_verify_cert function vulnerability in OpenSSL - CVE-2015-1793 1.0 July 21, 2015 July 21, 2015 Download FAQ PDF
071715 Packet Injection Vulnerability on 802.11n MAC Frame Aggregation 1.0 July 17, 2015 July 17, 2015 Download FAQ PDF
020215 glibc library vulnerability (commonly referred as ‘Ghost’) - CVE-2015-0235 1.0 February 2, 2015 February 2, 2015 Download FAQ PDF
123114 Network Time Protocol (NTP) vulnerability - CVE-2014-9295 1.0 December 31, 2014 December 31, 2014 Download FAQ PDF
111414 POODLE SSLv3 vulnerability - CVE-2014-3566 1.0 November 14, 2014 November 14, 2014 Download FAQ PDF
092914 GNU Bash vulnerability - CVE-2014-6271 and CVE-2014-7169 2.0 September 29, 2014 October 8, 2014 Download FAQ PDF
070714 OpenSSL 0.9.8, 1.0.0 & 1.0.1 library's vulnerability - CVE-2014-0224 1.0 July 7, 2014 July 7, 2014 Download FAQ PDF
041414 OpenSSL 1.0.1 library’s “Heart bleed” vulnerability — CVE-2014-0160 1.0 April 14, 2014 April 14, 2014 Download FAQ PDF
10282013 User authentication bypass vulnerability in Ruckus Access Point’s administrative web interface 1.0 October 28, 2013 October 28, 2013 Download FAQ PDF
111113-1 Authenticated code injection vulnerability in ZoneDirector administrative web interface 1.0 September 09, 2013 September 09, 2013 Download FAQ PDF
111113-2 Authenticated persistent cross site scripting vulnerability in guest pass provisioning web interface on ZoneDirector controllers 1.0 September 09, 2013 September 09, 2013 Download FAQ PDF
031813-1 Unauthenticated TCP tunneling on Ruckus devices via SSH server process 1.0 March 25, 2013 March 25, 2013 Download FAQ PDF
031813-2 User authentication bypass vulnerability in ZoneDirector administrative web interface 1.0 March 25, 2013 March 25, 2013 Download FAQ PDF