<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Please respond to the vulnerability of Broadcom Wi-Fi chipset. (CVE-2019-15126) in Access Points - Indoor and Outdoor</title>
    <link>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/Please-respond-to-the-vulnerability-of-Broadcom-Wi-Fi-chipset/m-p/38711#M10950</link>
    <description>&lt;P alt="" name="" rel="" target="" title="" type="" value=""&gt;Hello?&lt;/P&gt;&lt;P alt="" name="" rel="" target="" title="" type="" value=""&gt;Please respond to the vulnerability of Broadcom Wi-Fi chipset. (CVE-2019-15126)&lt;/P&gt;&lt;P alt="" name="" rel="" target="" title="" type="" value=""&gt;Please check the link below for details of the vulnerability.&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;gt; &lt;A href="https://nvd.nist.gov/vuln/detail/CVE-2019-15126" rel="nofollow" title="Link: https://nvd.nist.gov/vuln/detail/CVE-2019-15126"&gt;https://nvd.nist.gov/vuln/detail/CVE-2019-15126&lt;/A&gt;&lt;/P&gt;&lt;P alt="" name="" rel="" target="" title="" type="" value=""&gt;In this regard, our company needs documentation that the Access Point sold by Rukus is not related to the vulnerability of the Broadcom Wi-Fi chipset.&lt;/P&gt;&lt;P alt="" name="" rel="" target="" title="" type="" value=""&gt;This document was requested by our government agency.&lt;/P&gt;&lt;P alt="" name="" rel="" target="" title="" type="" value=""&gt;Or, please check what access point's Wi-Fi chipset is currently sold by Ruckus.&lt;/P&gt;&lt;P alt="" name="" rel="" target="" title="" type="" value=""&gt;The Access Points we have are T310, T510, R510, R610.&lt;/P&gt;&lt;P alt="" name="" rel="" target="" title="" type="" value=""&gt;I will wait for your reply.&lt;/P&gt;&lt;P alt="" name="" rel="" target="" title="" type="" value=""&gt;Thank you very much.&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 08 May 2020 04:44:40 GMT</pubDate>
    <dc:creator>dawoon_lee</dc:creator>
    <dc:date>2020-05-08T04:44:40Z</dc:date>
    <item>
      <title>Please respond to the vulnerability of Broadcom Wi-Fi chipset. (CVE-2019-15126)</title>
      <link>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/Please-respond-to-the-vulnerability-of-Broadcom-Wi-Fi-chipset/m-p/38711#M10950</link>
      <description>&lt;P alt="" name="" rel="" target="" title="" type="" value=""&gt;Hello?&lt;/P&gt;&lt;P alt="" name="" rel="" target="" title="" type="" value=""&gt;Please respond to the vulnerability of Broadcom Wi-Fi chipset. (CVE-2019-15126)&lt;/P&gt;&lt;P alt="" name="" rel="" target="" title="" type="" value=""&gt;Please check the link below for details of the vulnerability.&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;gt; &lt;A href="https://nvd.nist.gov/vuln/detail/CVE-2019-15126" rel="nofollow" title="Link: https://nvd.nist.gov/vuln/detail/CVE-2019-15126"&gt;https://nvd.nist.gov/vuln/detail/CVE-2019-15126&lt;/A&gt;&lt;/P&gt;&lt;P alt="" name="" rel="" target="" title="" type="" value=""&gt;In this regard, our company needs documentation that the Access Point sold by Rukus is not related to the vulnerability of the Broadcom Wi-Fi chipset.&lt;/P&gt;&lt;P alt="" name="" rel="" target="" title="" type="" value=""&gt;This document was requested by our government agency.&lt;/P&gt;&lt;P alt="" name="" rel="" target="" title="" type="" value=""&gt;Or, please check what access point's Wi-Fi chipset is currently sold by Ruckus.&lt;/P&gt;&lt;P alt="" name="" rel="" target="" title="" type="" value=""&gt;The Access Points we have are T310, T510, R510, R610.&lt;/P&gt;&lt;P alt="" name="" rel="" target="" title="" type="" value=""&gt;I will wait for your reply.&lt;/P&gt;&lt;P alt="" name="" rel="" target="" title="" type="" value=""&gt;Thank you very much.&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 08 May 2020 04:44:40 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/Please-respond-to-the-vulnerability-of-Broadcom-Wi-Fi-chipset/m-p/38711#M10950</guid>
      <dc:creator>dawoon_lee</dc:creator>
      <dc:date>2020-05-08T04:44:40Z</dc:date>
    </item>
    <item>
      <title>Re: Please respond to the vulnerability of Broadcom Wi-Fi chipset. (CVE-2019-15126)</title>
      <link>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/Please-respond-to-the-vulnerability-of-Broadcom-Wi-Fi-chipset/m-p/38712#M10951</link>
      <description>Hi Dawoon,&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;Please check the following KBA article:&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;A alt="" href="https://support.ruckuswireless.com/articles/000010204" name="" rel="nofollow" target="_blank" title="" type="" value=""&gt;000010204 - Kr00k - vulnerability&lt;/A&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;Kr00k – formally known as CVE-2019-15126, is a vulnerability in Broadcom
 and Cypress Wi-Fi chips that allows unauthorized decryption of some 
WPA2-encrypted traffic.&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;B alt="" name="" rel="" target="" title="" type="" value=""&gt;Since all&amp;nbsp;Ruckus APs are 100% Atheros and hence not affected by the vulnerability.&lt;/B&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;This is also covered in Security Bulletin:&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;A alt="" href="https://support.ruckuswireless.com/security_bulletins/303" name="" rel="nofollow" target="" title="Link httpssupportruckuswirelesscomsecurity_bulletins303" type="" value=""&gt;https://support.ruckuswireless.com/security_bulletins/303&lt;/A&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;I hope this answers your question.&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;</description>
      <pubDate>Fri, 08 May 2020 13:28:25 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/Please-respond-to-the-vulnerability-of-Broadcom-Wi-Fi-chipset/m-p/38712#M10951</guid>
      <dc:creator>albert_pierson</dc:creator>
      <dc:date>2020-05-08T13:28:25Z</dc:date>
    </item>
  </channel>
</rss>

