<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Dropbear SSH Server &amp;lt; 2016.72 Multiple Vulnerabilities (7982) in Access Points - Indoor and Outdoor</title>
    <link>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/Dropbear-SSH-Server-lt-2016-72-Multiple-Vulnerabilities-7982/m-p/11573#M2690</link>
    <description>Known Security issues are documented on Ruckus main site page:&amp;nbsp; &lt;A href="https://www.ruckuswireless.com/security" rel="nofollow"&gt;https://www.ruckuswireless.com/security&lt;/A&gt;</description>
    <pubDate>Wed, 21 Dec 2016 23:03:57 GMT</pubDate>
    <dc:creator>michael_brado</dc:creator>
    <dc:date>2016-12-21T23:03:57Z</dc:date>
    <item>
      <title>Dropbear SSH Server &lt; 2016.72 Multiple Vulnerabilities (7982)</title>
      <link>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/Dropbear-SSH-Server-lt-2016-72-Multiple-Vulnerabilities-7982/m-p/11572#M2689</link>
      <description>A Nessus scan came back with the "critical risk" alert "Dropbear SSH Server &amp;lt; 2016.72 Multiple Vulnerabilities" on both of our Ruckus 7982 access points.&lt;BR /&gt;&lt;BR /&gt;The solution offered is to "Upgrade to Dropbear SSH version 2016.74 or later." but I can't tell how to do that. &amp;nbsp;I searched the forum and saw a couple similar questions but nothing definitive. &amp;nbsp;Can anybody help me with this?&lt;BR /&gt;&lt;BR /&gt;Thanks!</description>
      <pubDate>Wed, 21 Dec 2016 04:02:17 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/Dropbear-SSH-Server-lt-2016-72-Multiple-Vulnerabilities-7982/m-p/11572#M2689</guid>
      <dc:creator>nathaniel_hatfi</dc:creator>
      <dc:date>2016-12-21T04:02:17Z</dc:date>
    </item>
    <item>
      <title>Re: Dropbear SSH Server &lt; 2016.72 Multiple Vulnerabilities (7982)</title>
      <link>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/Dropbear-SSH-Server-lt-2016-72-Multiple-Vulnerabilities-7982/m-p/11573#M2690</link>
      <description>Known Security issues are documented on Ruckus main site page:&amp;nbsp; &lt;A href="https://www.ruckuswireless.com/security" rel="nofollow"&gt;https://www.ruckuswireless.com/security&lt;/A&gt;</description>
      <pubDate>Wed, 21 Dec 2016 23:03:57 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/Dropbear-SSH-Server-lt-2016-72-Multiple-Vulnerabilities-7982/m-p/11573#M2690</guid>
      <dc:creator>michael_brado</dc:creator>
      <dc:date>2016-12-21T23:03:57Z</dc:date>
    </item>
    <item>
      <title>Re: Dropbear SSH Server &lt; 2016.72 Multiple Vulnerabilities (7982)</title>
      <link>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/Dropbear-SSH-Server-lt-2016-72-Multiple-Vulnerabilities-7982/m-p/11574#M2691</link>
      <description>Thanks for the link!  I'm not seeing this vulnerability or how to resolve it for my equipment?  I may just be browsing it inefficiently</description>
      <pubDate>Wed, 21 Dec 2016 23:25:01 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/Dropbear-SSH-Server-lt-2016-72-Multiple-Vulnerabilities-7982/m-p/11574#M2691</guid>
      <dc:creator>nathaniel_hatfi</dc:creator>
      <dc:date>2016-12-21T23:25:01Z</dc:date>
    </item>
  </channel>
</rss>

