<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Cloudpath Persistent XSS and CSRF Vulnerability in RUCKUS Self-Help</title>
    <link>https://community.ruckuswireless.com/t5/RUCKUS-Self-Help/Cloudpath-Persistent-XSS-and-CSRF-Vulnerability/m-p/69851#M251</link>
    <description>&lt;H2&gt;&lt;FONT face="book antiqua,palatino" size="5"&gt;&lt;FONT size="3"&gt;Hello All, &lt;/FONT&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;FONT size="3"&gt;This is an important security announcement for Cloudpath.&lt;/FONT&gt;&lt;BR /&gt;&lt;BR /&gt;What is the issue?&lt;BR /&gt;&lt;/FONT&gt;&lt;/H2&gt;&lt;P&gt;&lt;FONT face="georgia,palatino"&gt;A vulnerability in the web-based interface of the RUCKUS Cloudpath product could allow a remote, unauthenticated attacker to execute persistent XSS and CSRF attacks against an user of the admin management interface. A successful attack, combined with a certain admin activity, could allow the attacker to gain full admin privileges on the exploited system.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="georgia,palatino"&gt;&lt;STRONG&gt;What action should I take?&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="georgia,palatino"&gt;Updating the software to its most recent version, as detailed below, will resolve the vulnerability. Since this is a high severity vulnerability, all customers are strongly encouraged to apply the update at the earliest opportunity.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="georgia,palatino"&gt;&lt;STRONG&gt;What is the impact on RUCKUS products?&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="georgia,palatino"&gt;The following table describes the vulnerable products and software versions and the recommended actions.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;TABLE width="654"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD width="96"&gt;&lt;P&gt;&lt;FONT face="georgia,palatino"&gt;&lt;STRONG&gt;Product&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD width="216"&gt;&lt;P&gt;&lt;FONT face="georgia,palatino"&gt;&lt;STRONG&gt;Vulnerable Release&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD width="222"&gt;&lt;P&gt;&lt;FONT face="georgia,palatino"&gt;&lt;STRONG&gt;Resolution&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD width="120"&gt;&lt;P&gt;&lt;FONT face="georgia,palatino"&gt;&lt;STRONG&gt;Release Date&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="96"&gt;&lt;P&gt;&lt;FONT face="georgia,palatino"&gt;Cloudpath&lt;/FONT&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD width="216"&gt;&lt;P&gt;&lt;FONT face="georgia,palatino"&gt;&lt;SPAN&gt;Version 5.12 build 5538 or earlier&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;/TD&gt;&lt;TD width="222"&gt;&lt;P&gt;&lt;FONT face="georgia,palatino"&gt;&lt;SPAN&gt;Upgrade to Version 5.12 build 5550 or later&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;/TD&gt;&lt;TD width="120"&gt;&lt;P&gt;&lt;FONT face="georgia,palatino"&gt;Oct 13th, 2023&lt;/FONT&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;BR /&gt;&lt;FONT face="georgia,palatino"&gt;New version is available for download on all the &lt;STRONG&gt;on-premises Cloudpath&lt;/STRONG&gt;,&lt;STRONG&gt; Hosted Cloudpath&lt;/STRONG&gt; are already patched with the fix.&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;Administrator&lt;/STRONG&gt;&amp;gt;&amp;gt;&amp;gt;&lt;STRONG&gt;System Updates&lt;/STRONG&gt;&amp;gt;&amp;gt;&amp;gt;&lt;STRONG&gt;Download Update&lt;/STRONG&gt;.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="vijaykuniyal_0-1697476552082.png" style="width: 999px;"&gt;&lt;img src="https://community.ruckuswireless.com/t5/image/serverpage/image-id/9280iC22E5341C1D20F1E/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="vijaykuniyal_0-1697476552082.png" alt="vijaykuniyal_0-1697476552082.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="georgia,palatino"&gt;&lt;STRONG&gt;When will this RUCKUS Security Advisory be publicly posted?&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="comic sans ms,sans-serif"&gt;RUCKUS will release the initial security advisory to customers on 10/16/2023, follow below link for the official Security Advisory.&lt;/FONT&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://support.ruckuswireless.com/security_bulletins/" target="_blank" rel="noopener"&gt;https://support.ruckuswireless.com/security_bulletins/&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 16 Oct 2023 17:17:12 GMT</pubDate>
    <dc:creator>vijaykuniyal</dc:creator>
    <dc:date>2023-10-16T17:17:12Z</dc:date>
    <item>
      <title>Cloudpath Persistent XSS and CSRF Vulnerability</title>
      <link>https://community.ruckuswireless.com/t5/RUCKUS-Self-Help/Cloudpath-Persistent-XSS-and-CSRF-Vulnerability/m-p/69851#M251</link>
      <description>&lt;H2&gt;&lt;FONT face="book antiqua,palatino" size="5"&gt;&lt;FONT size="3"&gt;Hello All, &lt;/FONT&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;FONT size="3"&gt;This is an important security announcement for Cloudpath.&lt;/FONT&gt;&lt;BR /&gt;&lt;BR /&gt;What is the issue?&lt;BR /&gt;&lt;/FONT&gt;&lt;/H2&gt;&lt;P&gt;&lt;FONT face="georgia,palatino"&gt;A vulnerability in the web-based interface of the RUCKUS Cloudpath product could allow a remote, unauthenticated attacker to execute persistent XSS and CSRF attacks against an user of the admin management interface. A successful attack, combined with a certain admin activity, could allow the attacker to gain full admin privileges on the exploited system.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="georgia,palatino"&gt;&lt;STRONG&gt;What action should I take?&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="georgia,palatino"&gt;Updating the software to its most recent version, as detailed below, will resolve the vulnerability. Since this is a high severity vulnerability, all customers are strongly encouraged to apply the update at the earliest opportunity.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="georgia,palatino"&gt;&lt;STRONG&gt;What is the impact on RUCKUS products?&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="georgia,palatino"&gt;The following table describes the vulnerable products and software versions and the recommended actions.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;TABLE width="654"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD width="96"&gt;&lt;P&gt;&lt;FONT face="georgia,palatino"&gt;&lt;STRONG&gt;Product&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD width="216"&gt;&lt;P&gt;&lt;FONT face="georgia,palatino"&gt;&lt;STRONG&gt;Vulnerable Release&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD width="222"&gt;&lt;P&gt;&lt;FONT face="georgia,palatino"&gt;&lt;STRONG&gt;Resolution&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD width="120"&gt;&lt;P&gt;&lt;FONT face="georgia,palatino"&gt;&lt;STRONG&gt;Release Date&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="96"&gt;&lt;P&gt;&lt;FONT face="georgia,palatino"&gt;Cloudpath&lt;/FONT&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD width="216"&gt;&lt;P&gt;&lt;FONT face="georgia,palatino"&gt;&lt;SPAN&gt;Version 5.12 build 5538 or earlier&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;/TD&gt;&lt;TD width="222"&gt;&lt;P&gt;&lt;FONT face="georgia,palatino"&gt;&lt;SPAN&gt;Upgrade to Version 5.12 build 5550 or later&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;/TD&gt;&lt;TD width="120"&gt;&lt;P&gt;&lt;FONT face="georgia,palatino"&gt;Oct 13th, 2023&lt;/FONT&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;BR /&gt;&lt;FONT face="georgia,palatino"&gt;New version is available for download on all the &lt;STRONG&gt;on-premises Cloudpath&lt;/STRONG&gt;,&lt;STRONG&gt; Hosted Cloudpath&lt;/STRONG&gt; are already patched with the fix.&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;Administrator&lt;/STRONG&gt;&amp;gt;&amp;gt;&amp;gt;&lt;STRONG&gt;System Updates&lt;/STRONG&gt;&amp;gt;&amp;gt;&amp;gt;&lt;STRONG&gt;Download Update&lt;/STRONG&gt;.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="vijaykuniyal_0-1697476552082.png" style="width: 999px;"&gt;&lt;img src="https://community.ruckuswireless.com/t5/image/serverpage/image-id/9280iC22E5341C1D20F1E/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="vijaykuniyal_0-1697476552082.png" alt="vijaykuniyal_0-1697476552082.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="georgia,palatino"&gt;&lt;STRONG&gt;When will this RUCKUS Security Advisory be publicly posted?&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="comic sans ms,sans-serif"&gt;RUCKUS will release the initial security advisory to customers on 10/16/2023, follow below link for the official Security Advisory.&lt;/FONT&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://support.ruckuswireless.com/security_bulletins/" target="_blank" rel="noopener"&gt;https://support.ruckuswireless.com/security_bulletins/&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 16 Oct 2023 17:17:12 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/RUCKUS-Self-Help/Cloudpath-Persistent-XSS-and-CSRF-Vulnerability/m-p/69851#M251</guid>
      <dc:creator>vijaykuniyal</dc:creator>
      <dc:date>2023-10-16T17:17:12Z</dc:date>
    </item>
  </channel>
</rss>

