<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ICX XSS and CSRF Vulnerability in RUCKUS Self-Help</title>
    <link>https://community.ruckuswireless.com/t5/RUCKUS-Self-Help/ICX-XSS-and-CSRF-Vulnerability/m-p/66824#M206</link>
    <description>&lt;P&gt;This is vulnerability in the web-based management interface of the ICX ruckus product.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Workaround:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Need to disable web management access to the switches using below options.&lt;/P&gt;&lt;P&gt;By default, you will see https enabled.&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier" size="2"&gt;Device#show web&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier" size="2"&gt;HTTP server status: Disabled&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier" size="2"&gt;HTTPS server status: Enabled&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier" size="2"&gt;No web connection.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Use the below command to disable https:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier" size="2"&gt;Device(config)#no web-management https&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;If http is also enabled, then use the below command:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier" size="2"&gt;Device(config)#no web-management http&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;This vulnerability is found on 8095k and lower versions.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Resolution:&lt;/STRONG&gt; If major release on switch is 8095 version, then Upgrade to FI 08.0.95m or later&lt;/P&gt;&lt;P&gt;This vulnerability is also resolved on ICX switches on upgrading to 9010a and above.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Reference link for more details on the vulnerability:&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;FONT face="courier new,courier" size="2"&gt;&lt;A href="https://support.ruckuswireless.com/security_bulletins/321" target="_blank" rel="noopener"&gt;https://support.ruckuswireless.com/security_bulletins/321&lt;/A&gt;&lt;/FONT&gt;&lt;/LI&gt;&lt;/UL&gt;</description>
    <pubDate>Tue, 29 Aug 2023 17:49:03 GMT</pubDate>
    <dc:creator>Chandini</dc:creator>
    <dc:date>2023-08-29T17:49:03Z</dc:date>
    <item>
      <title>ICX XSS and CSRF Vulnerability</title>
      <link>https://community.ruckuswireless.com/t5/RUCKUS-Self-Help/ICX-XSS-and-CSRF-Vulnerability/m-p/66824#M206</link>
      <description>&lt;P&gt;This is vulnerability in the web-based management interface of the ICX ruckus product.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Workaround:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Need to disable web management access to the switches using below options.&lt;/P&gt;&lt;P&gt;By default, you will see https enabled.&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier" size="2"&gt;Device#show web&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier" size="2"&gt;HTTP server status: Disabled&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier" size="2"&gt;HTTPS server status: Enabled&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier" size="2"&gt;No web connection.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Use the below command to disable https:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier" size="2"&gt;Device(config)#no web-management https&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;If http is also enabled, then use the below command:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier" size="2"&gt;Device(config)#no web-management http&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;This vulnerability is found on 8095k and lower versions.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Resolution:&lt;/STRONG&gt; If major release on switch is 8095 version, then Upgrade to FI 08.0.95m or later&lt;/P&gt;&lt;P&gt;This vulnerability is also resolved on ICX switches on upgrading to 9010a and above.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Reference link for more details on the vulnerability:&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;FONT face="courier new,courier" size="2"&gt;&lt;A href="https://support.ruckuswireless.com/security_bulletins/321" target="_blank" rel="noopener"&gt;https://support.ruckuswireless.com/security_bulletins/321&lt;/A&gt;&lt;/FONT&gt;&lt;/LI&gt;&lt;/UL&gt;</description>
      <pubDate>Tue, 29 Aug 2023 17:49:03 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/RUCKUS-Self-Help/ICX-XSS-and-CSRF-Vulnerability/m-p/66824#M206</guid>
      <dc:creator>Chandini</dc:creator>
      <dc:date>2023-08-29T17:49:03Z</dc:date>
    </item>
  </channel>
</rss>

