<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic CVE-2022-22963 and CVE-2022-22965 (Spring4Shell zero-day RCE vulnerability) in RUCKUS Self-Help</title>
    <link>https://community.ruckuswireless.com/t5/RUCKUS-Self-Help/CVE-2022-22963-and-CVE-2022-22965-Spring4Shell-zero-day-RCE/m-p/44583#M38</link>
    <description>&lt;SECTION&gt;This post explains about recent security vulnerability CVE-2022-22963 and CVE-2022-22965 (Spring4Shell zero-day RCE vulnerability)&lt;/SECTION&gt;
&lt;SECTION&gt;
&lt;H2&gt;About the vulnerability&lt;/H2&gt;
&lt;P&gt;There are&amp;nbsp;two vulnerabilities affecting the Spring MVC (CVE-2022-22965) and Spring Cloud (CVE-2022-22963) components of the Spring Framework. These vulnerabilities are rated Critical as a successful exploit leads to remote code execution on the vulnerable system.&lt;/P&gt;
&lt;H3&gt;Question&lt;/H3&gt;
What Ruckus products are impacted with recent CVE-2022-22963 and CVE-2022-22965 (Spring4Shell zero-day RCE vulnerability)?&lt;/SECTION&gt;
&lt;SECTION&gt;
&lt;H2&gt;What RUCKUS Networks is doing to fix this vulnerability on impacted products?&lt;/H2&gt;
RUCKUS Networks security team is aware about the issue and already verified all the products.&lt;BR /&gt;&lt;BR /&gt;Most of RUCKUS Networks products are not impacted with this vulnerability and only one impacted product (Ruckus Cloud) was already patched on 15th April 2022.&lt;BR /&gt;&lt;BR /&gt;At this point, no RUCKUS products are impacted and no attention required from customers.
&lt;H2&gt;Is my RUCKUS product impacted?&lt;/H2&gt;
As of 18th April below is the status of RUCKUS products:&lt;BR /&gt;&amp;nbsp;
&lt;TABLE width="451"&gt;&lt;COLGROUP&gt;&lt;COL width="128" /&gt;&lt;COL width="195" /&gt;&lt;/COLGROUP&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD colspan="1" rowspan="1" data-sfdc_class="xl66"&gt;&lt;SPAN&gt;Product&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD colspan="1" rowspan="1" data-sfdc_class="xl66"&gt;&lt;SPAN&gt;Vulnerable?&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD colspan="1" rowspan="1" data-sfdc_class="xl66"&gt;&lt;SPAN&gt;Action required&lt;/SPAN&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD colspan="1" rowspan="1" data-sfdc_class="xl66"&gt;&lt;SPAN&gt;ZoneDirector&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD colspan="1" rowspan="1" data-sfdc_class="xl66"&gt;&lt;SPAN&gt;Not Vulnerable&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD colspan="1" rowspan="1" data-sfdc_class="xl66"&gt;&lt;SPAN&gt;No action required&lt;/SPAN&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD colspan="1" rowspan="1" data-sfdc_class="xl66"&gt;&lt;SPAN&gt;Unleashed&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD colspan="1" rowspan="1" data-sfdc_class="xl66"&gt;&lt;SPAN&gt;Not Vulnerable&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD colspan="1" rowspan="1" data-sfdc_class="xl66"&gt;&lt;SPAN&gt;No action required&lt;/SPAN&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD colspan="1" rowspan="1" data-sfdc_class="xl66"&gt;&lt;SPAN&gt;UMM/Flexmaster&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD colspan="1" rowspan="1" data-sfdc_class="xl66"&gt;&lt;SPAN&gt;Not Vulnerable&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD colspan="1" rowspan="1" data-sfdc_class="xl66"&gt;&lt;SPAN&gt;No action required&lt;/SPAN&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD colspan="1" rowspan="1" data-sfdc_class="xl66"&gt;&lt;FONT color="#172b4d"&gt;&lt;SPAN&gt;SmartZone/virtualSmartZone&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/TD&gt;
&lt;TD colspan="1" rowspan="1" data-sfdc_class="xl66"&gt;&lt;SPAN&gt;Not Vulnerable&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD colspan="1" rowspan="1" data-sfdc_class="xl66"&gt;&lt;SPAN&gt;No action required&lt;/SPAN&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD colspan="1" rowspan="1" data-sfdc_class="xl66"&gt;&lt;SPAN&gt;SPoT/vSPoT&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD colspan="1" rowspan="1" data-sfdc_class="xl66"&gt;&lt;SPAN&gt;Not Vulnerable&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD colspan="1" rowspan="1" data-sfdc_class="xl66"&gt;&lt;SPAN&gt;No action required&lt;/SPAN&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD colspan="1" rowspan="1" data-sfdc_class="xl66"&gt;&lt;SPAN&gt;RuckusAnalytics&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD colspan="1" rowspan="1" data-sfdc_class="xl66"&gt;&lt;SPAN&gt;Not Vulnerable&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD colspan="1" rowspan="1" data-sfdc_class="xl66"&gt;&lt;SPAN&gt;No action required&lt;/SPAN&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD colspan="1" rowspan="1" data-sfdc_class="xl66"&gt;&lt;SPAN&gt;MobileApps&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD colspan="1" rowspan="1" data-sfdc_class="xl66"&gt;&lt;SPAN&gt;Not Vulnerable&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD colspan="1" rowspan="1" data-sfdc_class="xl66"&gt;&lt;SPAN&gt;No action required&lt;/SPAN&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD colspan="1" rowspan="1" data-sfdc_class="xl66"&gt;&lt;SPAN&gt;IoT&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD colspan="1" rowspan="1" data-sfdc_class="xl66"&gt;&lt;SPAN&gt;Not Vulnerable&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD colspan="1" rowspan="1" data-sfdc_class="xl66"&gt;&lt;SPAN&gt;No action required&lt;/SPAN&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD colspan="1" rowspan="1" data-sfdc_class="xl66"&gt;&lt;SPAN&gt;ICX&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD colspan="1" rowspan="1" data-sfdc_class="xl66"&gt;&lt;SPAN&gt;Not Vulnerable&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD colspan="1" rowspan="1" data-sfdc_class="xl66"&gt;&lt;SPAN&gt;No action required&lt;/SPAN&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD colspan="1" rowspan="1" data-sfdc_class="xl66"&gt;&lt;SPAN&gt;CloudPath&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD colspan="1" rowspan="1" data-sfdc_class="xl66"&gt;&lt;SPAN&gt;Not Vulnerable&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD colspan="1" rowspan="1" data-sfdc_class="xl66"&gt;&lt;SPAN&gt;No action required&lt;/SPAN&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD colspan="1" rowspan="1" data-sfdc_class="xl66"&gt;&lt;FONT color="#172b4d"&gt;&lt;SPAN&gt;Access points&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/TD&gt;
&lt;TD colspan="1" rowspan="1" data-sfdc_class="xl66"&gt;&lt;SPAN&gt;Not Vulnerable&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD colspan="1" rowspan="1" data-sfdc_class="xl66"&gt;&lt;SPAN&gt;No action required&lt;/SPAN&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD colspan="1" rowspan="1" data-sfdc_class="xl66"&gt;&lt;SPAN&gt;IOT&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD colspan="1" rowspan="1" data-sfdc_class="xl66"&gt;&lt;SPAN&gt;Not Vulnerable&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD colspan="1" rowspan="1" data-sfdc_class="xl66"&gt;&lt;SPAN&gt;No action required&lt;/SPAN&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD colspan="1" rowspan="1" data-sfdc_class="xl67"&gt;&lt;SPAN&gt;Mobile APPs&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD colspan="1" rowspan="1" data-sfdc_class="xl66"&gt;&lt;SPAN&gt;Not Vulnerable&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD colspan="1" rowspan="1" data-sfdc_class="xl66"&gt;&lt;SPAN&gt;No action required&lt;/SPAN&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD colspan="1" rowspan="1" data-sfdc_class="xl66"&gt;&lt;SPAN&gt;CloudPath&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD colspan="1" rowspan="1" data-sfdc_class="xl66"&gt;&lt;SPAN&gt;Not Vulnerable&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD colspan="1" rowspan="1" data-sfdc_class="xl66"&gt;&lt;SPAN&gt;No action required&lt;/SPAN&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD colspan="1" rowspan="1" data-sfdc_class="xl66"&gt;&lt;SPAN&gt;SCI&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD colspan="1" rowspan="1" data-sfdc_class="xl66"&gt;&lt;SPAN&gt;Not Vulnerable&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD colspan="1" rowspan="1" data-sfdc_class="xl65"&gt;&lt;SPAN&gt;No action required&lt;/SPAN&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD colspan="1" rowspan="1" data-sfdc_class="xl66"&gt;&lt;SPAN&gt;RuckusCloud&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD colspan="1" rowspan="1" data-sfdc_class="xl66"&gt;&lt;SPAN&gt;Vulnerable&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD colspan="1" rowspan="1" data-sfdc_class="xl65"&gt;&lt;SPAN&gt;Already patched, no further action required&lt;/SPAN&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;H2&gt;&lt;BR /&gt;When impacted products will be patched?&lt;/H2&gt;
Only one product (RUCKUS Cloud) was vulnerable and same was patched on 15th April 2022.
&lt;P&gt;For any queries, feel free to reach Ruckus Support at&amp;nbsp;&lt;A href="https://support.ruckuswireless.com/contact-us" target="_blank" rel="noopener"&gt;https://support.ruckuswireless.com/contact-us&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;You can also refer our support center page at&amp;nbsp;&lt;A href="https://support.ruckuswireless.com/spring4shell-ruckus-technical-support-response-center" target="_blank" rel="noopener"&gt;https://support.ruckuswireless.com/spring4shell-ruckus-technical-support-response-center&lt;/A&gt;&lt;/P&gt;
&lt;/SECTION&gt;</description>
    <pubDate>Fri, 02 Feb 2024 17:01:04 GMT</pubDate>
    <dc:creator>syamantakomer</dc:creator>
    <dc:date>2024-02-02T17:01:04Z</dc:date>
    <item>
      <title>CVE-2022-22963 and CVE-2022-22965 (Spring4Shell zero-day RCE vulnerability)</title>
      <link>https://community.ruckuswireless.com/t5/RUCKUS-Self-Help/CVE-2022-22963-and-CVE-2022-22965-Spring4Shell-zero-day-RCE/m-p/44583#M38</link>
      <description>&lt;SECTION&gt;This post explains about recent security vulnerability CVE-2022-22963 and CVE-2022-22965 (Spring4Shell zero-day RCE vulnerability)&lt;/SECTION&gt;
&lt;SECTION&gt;
&lt;H2&gt;About the vulnerability&lt;/H2&gt;
&lt;P&gt;There are&amp;nbsp;two vulnerabilities affecting the Spring MVC (CVE-2022-22965) and Spring Cloud (CVE-2022-22963) components of the Spring Framework. These vulnerabilities are rated Critical as a successful exploit leads to remote code execution on the vulnerable system.&lt;/P&gt;
&lt;H3&gt;Question&lt;/H3&gt;
What Ruckus products are impacted with recent CVE-2022-22963 and CVE-2022-22965 (Spring4Shell zero-day RCE vulnerability)?&lt;/SECTION&gt;
&lt;SECTION&gt;
&lt;H2&gt;What RUCKUS Networks is doing to fix this vulnerability on impacted products?&lt;/H2&gt;
RUCKUS Networks security team is aware about the issue and already verified all the products.&lt;BR /&gt;&lt;BR /&gt;Most of RUCKUS Networks products are not impacted with this vulnerability and only one impacted product (Ruckus Cloud) was already patched on 15th April 2022.&lt;BR /&gt;&lt;BR /&gt;At this point, no RUCKUS products are impacted and no attention required from customers.
&lt;H2&gt;Is my RUCKUS product impacted?&lt;/H2&gt;
As of 18th April below is the status of RUCKUS products:&lt;BR /&gt;&amp;nbsp;
&lt;TABLE width="451"&gt;&lt;COLGROUP&gt;&lt;COL width="128" /&gt;&lt;COL width="195" /&gt;&lt;/COLGROUP&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD colspan="1" rowspan="1" data-sfdc_class="xl66"&gt;&lt;SPAN&gt;Product&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD colspan="1" rowspan="1" data-sfdc_class="xl66"&gt;&lt;SPAN&gt;Vulnerable?&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD colspan="1" rowspan="1" data-sfdc_class="xl66"&gt;&lt;SPAN&gt;Action required&lt;/SPAN&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD colspan="1" rowspan="1" data-sfdc_class="xl66"&gt;&lt;SPAN&gt;ZoneDirector&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD colspan="1" rowspan="1" data-sfdc_class="xl66"&gt;&lt;SPAN&gt;Not Vulnerable&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD colspan="1" rowspan="1" data-sfdc_class="xl66"&gt;&lt;SPAN&gt;No action required&lt;/SPAN&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD colspan="1" rowspan="1" data-sfdc_class="xl66"&gt;&lt;SPAN&gt;Unleashed&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD colspan="1" rowspan="1" data-sfdc_class="xl66"&gt;&lt;SPAN&gt;Not Vulnerable&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD colspan="1" rowspan="1" data-sfdc_class="xl66"&gt;&lt;SPAN&gt;No action required&lt;/SPAN&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD colspan="1" rowspan="1" data-sfdc_class="xl66"&gt;&lt;SPAN&gt;UMM/Flexmaster&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD colspan="1" rowspan="1" data-sfdc_class="xl66"&gt;&lt;SPAN&gt;Not Vulnerable&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD colspan="1" rowspan="1" data-sfdc_class="xl66"&gt;&lt;SPAN&gt;No action required&lt;/SPAN&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD colspan="1" rowspan="1" data-sfdc_class="xl66"&gt;&lt;FONT color="#172b4d"&gt;&lt;SPAN&gt;SmartZone/virtualSmartZone&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/TD&gt;
&lt;TD colspan="1" rowspan="1" data-sfdc_class="xl66"&gt;&lt;SPAN&gt;Not Vulnerable&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD colspan="1" rowspan="1" data-sfdc_class="xl66"&gt;&lt;SPAN&gt;No action required&lt;/SPAN&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD colspan="1" rowspan="1" data-sfdc_class="xl66"&gt;&lt;SPAN&gt;SPoT/vSPoT&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD colspan="1" rowspan="1" data-sfdc_class="xl66"&gt;&lt;SPAN&gt;Not Vulnerable&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD colspan="1" rowspan="1" data-sfdc_class="xl66"&gt;&lt;SPAN&gt;No action required&lt;/SPAN&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD colspan="1" rowspan="1" data-sfdc_class="xl66"&gt;&lt;SPAN&gt;RuckusAnalytics&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD colspan="1" rowspan="1" data-sfdc_class="xl66"&gt;&lt;SPAN&gt;Not Vulnerable&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD colspan="1" rowspan="1" data-sfdc_class="xl66"&gt;&lt;SPAN&gt;No action required&lt;/SPAN&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD colspan="1" rowspan="1" data-sfdc_class="xl66"&gt;&lt;SPAN&gt;MobileApps&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD colspan="1" rowspan="1" data-sfdc_class="xl66"&gt;&lt;SPAN&gt;Not Vulnerable&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD colspan="1" rowspan="1" data-sfdc_class="xl66"&gt;&lt;SPAN&gt;No action required&lt;/SPAN&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD colspan="1" rowspan="1" data-sfdc_class="xl66"&gt;&lt;SPAN&gt;IoT&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD colspan="1" rowspan="1" data-sfdc_class="xl66"&gt;&lt;SPAN&gt;Not Vulnerable&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD colspan="1" rowspan="1" data-sfdc_class="xl66"&gt;&lt;SPAN&gt;No action required&lt;/SPAN&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD colspan="1" rowspan="1" data-sfdc_class="xl66"&gt;&lt;SPAN&gt;ICX&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD colspan="1" rowspan="1" data-sfdc_class="xl66"&gt;&lt;SPAN&gt;Not Vulnerable&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD colspan="1" rowspan="1" data-sfdc_class="xl66"&gt;&lt;SPAN&gt;No action required&lt;/SPAN&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD colspan="1" rowspan="1" data-sfdc_class="xl66"&gt;&lt;SPAN&gt;CloudPath&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD colspan="1" rowspan="1" data-sfdc_class="xl66"&gt;&lt;SPAN&gt;Not Vulnerable&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD colspan="1" rowspan="1" data-sfdc_class="xl66"&gt;&lt;SPAN&gt;No action required&lt;/SPAN&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD colspan="1" rowspan="1" data-sfdc_class="xl66"&gt;&lt;FONT color="#172b4d"&gt;&lt;SPAN&gt;Access points&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/TD&gt;
&lt;TD colspan="1" rowspan="1" data-sfdc_class="xl66"&gt;&lt;SPAN&gt;Not Vulnerable&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD colspan="1" rowspan="1" data-sfdc_class="xl66"&gt;&lt;SPAN&gt;No action required&lt;/SPAN&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD colspan="1" rowspan="1" data-sfdc_class="xl66"&gt;&lt;SPAN&gt;IOT&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD colspan="1" rowspan="1" data-sfdc_class="xl66"&gt;&lt;SPAN&gt;Not Vulnerable&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD colspan="1" rowspan="1" data-sfdc_class="xl66"&gt;&lt;SPAN&gt;No action required&lt;/SPAN&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD colspan="1" rowspan="1" data-sfdc_class="xl67"&gt;&lt;SPAN&gt;Mobile APPs&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD colspan="1" rowspan="1" data-sfdc_class="xl66"&gt;&lt;SPAN&gt;Not Vulnerable&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD colspan="1" rowspan="1" data-sfdc_class="xl66"&gt;&lt;SPAN&gt;No action required&lt;/SPAN&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD colspan="1" rowspan="1" data-sfdc_class="xl66"&gt;&lt;SPAN&gt;CloudPath&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD colspan="1" rowspan="1" data-sfdc_class="xl66"&gt;&lt;SPAN&gt;Not Vulnerable&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD colspan="1" rowspan="1" data-sfdc_class="xl66"&gt;&lt;SPAN&gt;No action required&lt;/SPAN&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD colspan="1" rowspan="1" data-sfdc_class="xl66"&gt;&lt;SPAN&gt;SCI&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD colspan="1" rowspan="1" data-sfdc_class="xl66"&gt;&lt;SPAN&gt;Not Vulnerable&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD colspan="1" rowspan="1" data-sfdc_class="xl65"&gt;&lt;SPAN&gt;No action required&lt;/SPAN&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD colspan="1" rowspan="1" data-sfdc_class="xl66"&gt;&lt;SPAN&gt;RuckusCloud&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD colspan="1" rowspan="1" data-sfdc_class="xl66"&gt;&lt;SPAN&gt;Vulnerable&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD colspan="1" rowspan="1" data-sfdc_class="xl65"&gt;&lt;SPAN&gt;Already patched, no further action required&lt;/SPAN&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;H2&gt;&lt;BR /&gt;When impacted products will be patched?&lt;/H2&gt;
Only one product (RUCKUS Cloud) was vulnerable and same was patched on 15th April 2022.
&lt;P&gt;For any queries, feel free to reach Ruckus Support at&amp;nbsp;&lt;A href="https://support.ruckuswireless.com/contact-us" target="_blank" rel="noopener"&gt;https://support.ruckuswireless.com/contact-us&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;You can also refer our support center page at&amp;nbsp;&lt;A href="https://support.ruckuswireless.com/spring4shell-ruckus-technical-support-response-center" target="_blank" rel="noopener"&gt;https://support.ruckuswireless.com/spring4shell-ruckus-technical-support-response-center&lt;/A&gt;&lt;/P&gt;
&lt;/SECTION&gt;</description>
      <pubDate>Fri, 02 Feb 2024 17:01:04 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/RUCKUS-Self-Help/CVE-2022-22963-and-CVE-2022-22965-Spring4Shell-zero-day-RCE/m-p/44583#M38</guid>
      <dc:creator>syamantakomer</dc:creator>
      <dc:date>2024-02-02T17:01:04Z</dc:date>
    </item>
  </channel>
</rss>

