<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: CVE-2023-25717 - RUCKUS AP Web Vulnerability (RCE/CSRF) in RUCKUS Self-Help</title>
    <link>https://community.ruckuswireless.com/t5/RUCKUS-Self-Help/CVE-2023-25717-RUCKUS-AP-Web-Vulnerability-RCE-CSRF/m-p/59319#M150</link>
    <description>&lt;P&gt;When I run get https on my APs I get this:&lt;BR /&gt;HTTPs access is enabled&lt;BR /&gt;But the service is off, it is turned off to save memory once AP is managed by SCG!&lt;BR /&gt;If you need the service, please enable again by command "set https/http enable"!&lt;BR /&gt;OK&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;does that mean it's vulnerable or not?&lt;/P&gt;</description>
    <pubDate>Tue, 23 May 2023 15:36:44 GMT</pubDate>
    <dc:creator>TheLakeHouseIT</dc:creator>
    <dc:date>2023-05-23T15:36:44Z</dc:date>
    <item>
      <title>CVE-2023-25717 - RUCKUS AP Web Vulnerability (RCE/CSRF)</title>
      <link>https://community.ruckuswireless.com/t5/RUCKUS-Self-Help/CVE-2023-25717-RUCKUS-AP-Web-Vulnerability-RCE-CSRF/m-p/58793#M147</link>
      <description>&lt;P&gt;Hello All,&lt;/P&gt;
&lt;P&gt;This is an important security announcement.&lt;/P&gt;
&lt;P&gt;A critical vulnerability was found in the web services component in earlier RUCKUS AP software. If the&lt;BR /&gt;affected web services component is enabled on the AP, this vulnerability allows an attacker to perform&lt;BR /&gt;remote code execution (RCE) and cross-site request forgery (CSRF).&lt;/P&gt;
&lt;P&gt;A security bulletin was posted by RUCKUS Networks Security team on 8th Feb 2023. Please refer the same from the below link.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://support.ruckuswireless.com/security_bulletins/315" target="_blank" rel="noopener"&gt;https://support.ruckuswireless.com/security_bulletins/315&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;You can also refer our&amp;nbsp;Technical Support Response Center page from the below link. It has more information.&lt;/P&gt;
&lt;P&gt;&lt;A id="LPNoLPOWALinkPreview_1" href="https://support.ruckuswireless.com/rce-csrf-ruckus-tech-support-response-center" target="_blank" rel="noopener"&gt;https://support.ruckuswireless.com/rce-csrf-ruckus-tech-support-response-center&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Please be informed, all the impacted devices were already fixed long back. However, if you are running your RUCKUS APs on an impacted version, please refer our &lt;A href="https://support.ruckuswireless.com/rce-csrf-ruckus-tech-support-response-center" target="_self"&gt;Technical Support Response Center page&lt;/A&gt;&amp;nbsp;and upgrade your controller/APs to the recommended versions.&lt;/P&gt;
&lt;P&gt;While you check and plan to upgrade your devices, we strongly recommend you to implement the workaround first, as this will immediately block the possibility of this security vulnerability.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Workaround:&lt;/STRONG&gt; This vulnerability can be mitigated by disabling the web services (HTTP and HTTPS) on the AP. This can be done by using the AP CLI command "set https disable" and "set http disable" command.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Note:&lt;/STRONG&gt; For ZoneDirector and SmartZone APs, the web services components are disabled by default, once AP joins the controller.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Some quick facts:&lt;/STRONG&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Only Access Points are impacted due to this security vulnerability, not the controllers.&lt;/LI&gt;
&lt;LI&gt;Disabling web server on AP (HTTP and HTTPS) guaranties no further possibility of an attack.&lt;/LI&gt;
&lt;LI&gt;By default, any AP joining a RUCKUS Controller disables the AP web service, so your AP will only be impacted if you are using it in standalone mode or enabled the HTTP or HTTPS manually.&lt;/LI&gt;
&lt;LI&gt;Only SmartZone, Zonedirector and solo (standalone) access point software versions are impacted.&lt;/LI&gt;
&lt;LI&gt;RUCKUS Cloud and Unleashed APs are not impacted.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;If you got any queries, please use the comment section on this thread.&lt;/P&gt;
&lt;P&gt;Thank you!&lt;/P&gt;</description>
      <pubDate>Fri, 02 Feb 2024 16:57:34 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/RUCKUS-Self-Help/CVE-2023-25717-RUCKUS-AP-Web-Vulnerability-RCE-CSRF/m-p/58793#M147</guid>
      <dc:creator>syamantakomer</dc:creator>
      <dc:date>2024-02-02T16:57:34Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2023-25717 - RUCKUS AP Web Vulnerability (RCE/CSRF)</title>
      <link>https://community.ruckuswireless.com/t5/RUCKUS-Self-Help/CVE-2023-25717-RUCKUS-AP-Web-Vulnerability-RCE-CSRF/m-p/59087#M148</link>
      <description>&lt;P&gt;Is there a way to verify if our APs that are inside of vSZ have in fact gotten the HTTPS GUI turned off ? I've come into this infra long after they were installed and would like to have certainties that this feature is turned off on all AP's&lt;/P&gt;</description>
      <pubDate>Fri, 19 May 2023 16:00:18 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/RUCKUS-Self-Help/CVE-2023-25717-RUCKUS-AP-Web-Vulnerability-RCE-CSRF/m-p/59087#M148</guid>
      <dc:creator>Jakezxz1</dc:creator>
      <dc:date>2023-05-19T16:00:18Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2023-25717 - RUCKUS AP Web Vulnerability (RCE/CSRF)</title>
      <link>https://community.ruckuswireless.com/t5/RUCKUS-Self-Help/CVE-2023-25717-RUCKUS-AP-Web-Vulnerability-RCE-CSRF/m-p/59120#M149</link>
      <description>&lt;P&gt;&lt;a href="https://community.ruckuswireless.com/t5/user/viewprofilepage/user-id/18712"&gt;@Jakezxz1&lt;/a&gt;&amp;nbsp;By default all the AP's connecting to vSZ will get HTTP/HTTPS disabled&lt;/P&gt;&lt;P&gt;You can confirm the same by logging to AP CLI (SSH) and execute the below commands,&lt;/P&gt;&lt;P&gt;"get http" and "get https", this will provide you the status of GUI&lt;/P&gt;&lt;P&gt;Also, you ca try picking any random AP and try accessing the AP using a browser.&lt;/P&gt;</description>
      <pubDate>Fri, 19 May 2023 20:43:06 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/RUCKUS-Self-Help/CVE-2023-25717-RUCKUS-AP-Web-Vulnerability-RCE-CSRF/m-p/59120#M149</guid>
      <dc:creator>Mohsin</dc:creator>
      <dc:date>2023-05-19T20:43:06Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2023-25717 - RUCKUS AP Web Vulnerability (RCE/CSRF)</title>
      <link>https://community.ruckuswireless.com/t5/RUCKUS-Self-Help/CVE-2023-25717-RUCKUS-AP-Web-Vulnerability-RCE-CSRF/m-p/59319#M150</link>
      <description>&lt;P&gt;When I run get https on my APs I get this:&lt;BR /&gt;HTTPs access is enabled&lt;BR /&gt;But the service is off, it is turned off to save memory once AP is managed by SCG!&lt;BR /&gt;If you need the service, please enable again by command "set https/http enable"!&lt;BR /&gt;OK&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;does that mean it's vulnerable or not?&lt;/P&gt;</description>
      <pubDate>Tue, 23 May 2023 15:36:44 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/RUCKUS-Self-Help/CVE-2023-25717-RUCKUS-AP-Web-Vulnerability-RCE-CSRF/m-p/59319#M150</guid>
      <dc:creator>TheLakeHouseIT</dc:creator>
      <dc:date>2023-05-23T15:36:44Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2023-25717 - RUCKUS AP Web Vulnerability (RCE/CSRF)</title>
      <link>https://community.ruckuswireless.com/t5/RUCKUS-Self-Help/CVE-2023-25717-RUCKUS-AP-Web-Vulnerability-RCE-CSRF/m-p/59321#M151</link>
      <description>&lt;P&gt;&lt;a href="https://community.ruckuswireless.com/t5/user/viewprofilepage/user-id/18738"&gt;@TheLakeHouseIT&lt;/a&gt;, Since the AP HTTPs is enabled and the services are turned off. It's not vulnerable.&lt;/P&gt;&lt;P&gt;But, I would recommend to turn off the HTTPs service on the AP's using "set http/https disable"&lt;/P&gt;&lt;P&gt;Have you tried accessing the AP GUI through browser&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 23 May 2023 15:50:11 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/RUCKUS-Self-Help/CVE-2023-25717-RUCKUS-AP-Web-Vulnerability-RCE-CSRF/m-p/59321#M151</guid>
      <dc:creator>Mohsin</dc:creator>
      <dc:date>2023-05-23T15:50:11Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2023-25717 - RUCKUS AP Web Vulnerability (RCE/CSRF)</title>
      <link>https://community.ruckuswireless.com/t5/RUCKUS-Self-Help/CVE-2023-25717-RUCKUS-AP-Web-Vulnerability-RCE-CSRF/m-p/59322#M152</link>
      <description>&lt;P&gt;The APs reply with error 503 service unavailable. Again I'm not sure if that means you could run the exploit or not.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I will disable https and update when possible either way.&lt;/P&gt;</description>
      <pubDate>Tue, 23 May 2023 15:53:58 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/RUCKUS-Self-Help/CVE-2023-25717-RUCKUS-AP-Web-Vulnerability-RCE-CSRF/m-p/59322#M152</guid>
      <dc:creator>TheLakeHouseIT</dc:creator>
      <dc:date>2023-05-23T15:53:58Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2023-25717 - RUCKUS AP Web Vulnerability (RCE/CSRF)</title>
      <link>https://community.ruckuswireless.com/t5/RUCKUS-Self-Help/CVE-2023-25717-RUCKUS-AP-Web-Vulnerability-RCE-CSRF/m-p/59323#M153</link>
      <description>&lt;P&gt;&lt;a href="https://community.ruckuswireless.com/t5/user/viewprofilepage/user-id/18738"&gt;@TheLakeHouseIT&lt;/a&gt;&amp;nbsp;Since you are unable to access AP via GUI, its not vulnerable.&lt;/P&gt;&lt;P&gt;Please let us, if you have any further queries.&lt;/P&gt;</description>
      <pubDate>Tue, 23 May 2023 16:04:32 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/RUCKUS-Self-Help/CVE-2023-25717-RUCKUS-AP-Web-Vulnerability-RCE-CSRF/m-p/59323#M153</guid>
      <dc:creator>Mohsin</dc:creator>
      <dc:date>2023-05-23T16:04:32Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2023-25717 - RUCKUS AP Web Vulnerability (RCE/CSRF)</title>
      <link>https://community.ruckuswireless.com/t5/RUCKUS-Self-Help/CVE-2023-25717-RUCKUS-AP-Web-Vulnerability-RCE-CSRF/m-p/60134#M155</link>
      <description>&lt;P&gt;&lt;a href="https://community.ruckuswireless.com/t5/user/viewprofilepage/user-id/11"&gt;@syamantakomer&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So we are adviced to upgrade as below;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;SmartZone and Virtual SmartZone : Upgrade to 5.2.2MR2 or later release&lt;/LI&gt;&lt;LI&gt;ZoneDirector : Upgrade to 10.4.1.257 (GA Refresh 4) or later&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;While ZD1200 has firmware for 10.5.x version how come ZD11XX and ZD30XX series doesn't have?&lt;/P&gt;&lt;P&gt;How we can secure ZD1125, ZD1150 and ZD3050 models then?&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Wed, 07 Jun 2023 10:56:57 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/RUCKUS-Self-Help/CVE-2023-25717-RUCKUS-AP-Web-Vulnerability-RCE-CSRF/m-p/60134#M155</guid>
      <dc:creator>orcuncolakoglu</dc:creator>
      <dc:date>2023-06-07T10:56:57Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2023-25717 - RUCKUS AP Web Vulnerability (RCE/CSRF)</title>
      <link>https://community.ruckuswireless.com/t5/RUCKUS-Self-Help/CVE-2023-25717-RUCKUS-AP-Web-Vulnerability-RCE-CSRF/m-p/60794#M159</link>
      <description>&lt;P&gt;Your security advisory says Solo APs "114.0.0.0.5562 and earlier" are affected.&lt;/P&gt;&lt;P&gt;Although I can reproduce the POC on APs running ZD 10.3 &amp;amp; 10.4 firmware, I can't reproduce on e.g. a zf7982 running Solo 104.0.&lt;BR /&gt;Is it only Solo 114.x which is affected, or is it really all previous Solo versions too (in which case I'll try harder to reproduce)?&lt;/P&gt;&lt;P&gt;This is quite important to know, since you're not releasing security fixes for old APs.&lt;/P&gt;</description>
      <pubDate>Fri, 16 Jun 2023 06:59:02 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/RUCKUS-Self-Help/CVE-2023-25717-RUCKUS-AP-Web-Vulnerability-RCE-CSRF/m-p/60794#M159</guid>
      <dc:creator>ms264556</dc:creator>
      <dc:date>2023-06-16T06:59:02Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2023-25717 - RUCKUS AP Web Vulnerability (RCE/CSRF)</title>
      <link>https://community.ruckuswireless.com/t5/RUCKUS-Self-Help/CVE-2023-25717-RUCKUS-AP-Web-Vulnerability-RCE-CSRF/m-p/61640#M164</link>
      <description>&lt;P&gt;As long as AP web (http/https) is disabled, none of your APs are impacted. Please refer the workaround for the EOL devices which cannot be upgraded to the recommended version.&lt;/P&gt;</description>
      <pubDate>Tue, 27 Jun 2023 18:16:21 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/RUCKUS-Self-Help/CVE-2023-25717-RUCKUS-AP-Web-Vulnerability-RCE-CSRF/m-p/61640#M164</guid>
      <dc:creator>syamantakomer</dc:creator>
      <dc:date>2023-06-27T18:16:21Z</dc:date>
    </item>
  </channel>
</rss>

