<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Claroty Vulnerability Report in SmartZone and Virtual SmartZone</title>
    <link>https://community.ruckuswireless.com/t5/SmartZone-and-Virtual-SmartZone/Claroty-Vulnerability-Report/m-p/107415#M5954</link>
    <description>&lt;P&gt;No communication from Ruckus on the findings by Claroty?&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.helpnetsecurity.com/2025/07/10/ruckus-network-management-solutions-riddled-with-unpatched-vulnerabilities/" target="_blank"&gt;https://www.helpnetsecurity.com/2025/07/10/ruckus-network-management-solutions-riddled-with-unpatched-vulnerabilities/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;CVE-2025-44957&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;CVE-2025-44962&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;CVE-2025-44954&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;CVE-2025-44960, CVE-2025-44961&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;CVE-2025-44963&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;CVE-2025-44955&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;CVE-2025-6243&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;CVE-2025-44958&lt;/STRONG&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 10 Jul 2025 15:07:29 GMT</pubDate>
    <dc:creator>jsanders</dc:creator>
    <dc:date>2025-07-10T15:07:29Z</dc:date>
    <item>
      <title>Claroty Vulnerability Report</title>
      <link>https://community.ruckuswireless.com/t5/SmartZone-and-Virtual-SmartZone/Claroty-Vulnerability-Report/m-p/107415#M5954</link>
      <description>&lt;P&gt;No communication from Ruckus on the findings by Claroty?&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.helpnetsecurity.com/2025/07/10/ruckus-network-management-solutions-riddled-with-unpatched-vulnerabilities/" target="_blank"&gt;https://www.helpnetsecurity.com/2025/07/10/ruckus-network-management-solutions-riddled-with-unpatched-vulnerabilities/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;CVE-2025-44957&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;CVE-2025-44962&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;CVE-2025-44954&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;CVE-2025-44960, CVE-2025-44961&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;CVE-2025-44963&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;CVE-2025-44955&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;CVE-2025-6243&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;CVE-2025-44958&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 10 Jul 2025 15:07:29 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/SmartZone-and-Virtual-SmartZone/Claroty-Vulnerability-Report/m-p/107415#M5954</guid>
      <dc:creator>jsanders</dc:creator>
      <dc:date>2025-07-10T15:07:29Z</dc:date>
    </item>
    <item>
      <title>Re: Claroty Vulnerability Report</title>
      <link>https://community.ruckuswireless.com/t5/SmartZone-and-Virtual-SmartZone/Claroty-Vulnerability-Report/m-p/107416#M5955</link>
      <description>&lt;P&gt;Thanks&amp;nbsp;&lt;a href="https://community.ruckuswireless.com/t5/user/viewprofilepage/user-id/86"&gt;@jsanders&lt;/a&gt;&amp;nbsp;- your post was initially filtered into Spam quarantine, but was quickly released. Khoros (our community platform provider) uses a third-party Spam filter; we did not actively remove your post.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We are aware of the recent public disclosure concerning security vulnerabilities reportedly affecting RUCKUS SmartZone and RUCKUS Network Director.&lt;/P&gt;
&lt;P&gt;RUCKUS Security Incident Response Team is actively reviewing the disclosure and working through appropriate channels to complete a thorough investigation and provide an appropriate response.&lt;/P&gt;
&lt;P&gt;Further updates will be shared once we have received necessary additional information and identified the proper course of action.&lt;/P&gt;
&lt;P&gt;Our commitment to transparency and integrity remains unchanged, principles consistently demonstrated in previous security incidents. We continue to uphold industry-leading standards in responsiveness and openness when addressing such matters.&lt;/P&gt;</description>
      <pubDate>Thu, 10 Jul 2025 18:59:59 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/SmartZone-and-Virtual-SmartZone/Claroty-Vulnerability-Report/m-p/107416#M5955</guid>
      <dc:creator>dave_feasey</dc:creator>
      <dc:date>2025-07-10T18:59:59Z</dc:date>
    </item>
  </channel>
</rss>

