<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Dropbear SSH 2016.74 and 2017.75 in Access Points - Indoor and Outdoor</title>
    <link>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/Dropbear-SSH-2016-74-and-2017-75/m-p/19066#M5036</link>
    <description>Hi Hendrick,&lt;BR /&gt;What version are you running on the ZD1100 and which AP models are you having the issue with?&lt;BR /&gt;&lt;BR /&gt;regards&lt;BR /&gt;Martin</description>
    <pubDate>Wed, 17 Jan 2018 21:05:08 GMT</pubDate>
    <dc:creator>martin_martin</dc:creator>
    <dc:date>2018-01-17T21:05:08Z</dc:date>
    <item>
      <title>Dropbear SSH 2016.74 and 2017.75</title>
      <link>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/Dropbear-SSH-2016-74-and-2017-75/m-p/19065#M5035</link>
      <description>At my company, we did a security assessment on all of our network. Our APs came back with the Dropbear SSH 2016.74 and 2017.75 vulnerabilities. I have already have a case open and have updated my ZD1100 to the latest ZD patch I was told to update. &lt;BR /&gt;&lt;BR /&gt;The vulnerability is still there plus 2017.75 popped up as well. Are there any updates or anything I can work with in order to patch these vulnerabilities. We currently have 4 APs with this issue.</description>
      <pubDate>Wed, 17 Jan 2018 17:56:06 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/Dropbear-SSH-2016-74-and-2017-75/m-p/19065#M5035</guid>
      <dc:creator>hendrick_naranj</dc:creator>
      <dc:date>2018-01-17T17:56:06Z</dc:date>
    </item>
    <item>
      <title>Re: Dropbear SSH 2016.74 and 2017.75</title>
      <link>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/Dropbear-SSH-2016-74-and-2017-75/m-p/19066#M5036</link>
      <description>Hi Hendrick,&lt;BR /&gt;What version are you running on the ZD1100 and which AP models are you having the issue with?&lt;BR /&gt;&lt;BR /&gt;regards&lt;BR /&gt;Martin</description>
      <pubDate>Wed, 17 Jan 2018 21:05:08 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/Dropbear-SSH-2016-74-and-2017-75/m-p/19066#M5036</guid>
      <dc:creator>martin_martin</dc:creator>
      <dc:date>2018-01-17T21:05:08Z</dc:date>
    </item>
    <item>
      <title>Re: Dropbear SSH 2016.74 and 2017.75</title>
      <link>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/Dropbear-SSH-2016-74-and-2017-75/m-p/19067#M5037</link>
      <description>Hello Martin,&lt;BR /&gt;&lt;BR /&gt;Version 9.10.2.0 build 53&lt;BR /&gt;R300 APs</description>
      <pubDate>Wed, 17 Jan 2018 21:28:29 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/Dropbear-SSH-2016-74-and-2017-75/m-p/19067#M5037</guid>
      <dc:creator>hendrick_naranj</dc:creator>
      <dc:date>2018-01-17T21:28:29Z</dc:date>
    </item>
  </channel>
</rss>

