<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Unleashed R510 CVE's in Unleashed</title>
    <link>https://community.ruckuswireless.com/t5/Unleashed/Unleashed-R510-CVE-s/m-p/113602#M7284</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;CVE-2020-36254 :&amp;nbsp;&lt;/STRONG&gt;Our AP should not be vulnerable to CVE-2020-36254 for the following reason:&lt;BR /&gt;1. Our scp binary should be from openssh rather than dropbear, which is not vulnerable to the above CVE.&lt;BR /&gt;2. Even if the binary is from dropbear, there is no interface to scp from standard UI (our box is a closed system), hence the vulnerability shouldn’t be exploitable.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;CVE-2021-36369 :&amp;nbsp;&lt;/STRONG&gt;Currently, the Dropbear version in the firmware (200.18) is v2018.76 which is the same as the firmware 200.15.6.212.20 and 200.15.6.212.27. And there is no plan to upgrade to version 2020.81. Instead, we will be replacing Dropbear with OpenSSH in release (200.19), which will include a fix.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;CVE-2023-48795 :&amp;nbsp;&lt;/STRONG&gt; Re&lt;SPAN&gt;fers to a vulnerability in OpenSSH, potentially allowing attackers to exploit weaknesses in SSH encryption algorithms AP's do not support the vulnerable cipher and therefore are not affected by this. Thus, unleashed is not vulnerable to CVE-2023-48795&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN&gt;CVE-2019-12953,&amp;nbsp;&lt;/SPAN&gt;CVE-2018-15599 :&amp;nbsp;&lt;/STRONG&gt;Dropbear 2011.54 through 2018.76 has an inconsistent failure delay that may lead to revealing valid usernames.&lt;BR /&gt;Our product Ruckus unleashed is not using the Dropbear password verify so its not vulnerable to this.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Overall, 200.19 will be using OpenSSH instead of Dropbear, so upgrading to 200.19 will be a feasible solution.&lt;/P&gt;</description>
    <pubDate>Tue, 31 Mar 2026 03:14:50 GMT</pubDate>
    <dc:creator>sanjay_kumar</dc:creator>
    <dc:date>2026-03-31T03:14:50Z</dc:date>
    <item>
      <title>Unleashed R510 CVE's</title>
      <link>https://community.ruckuswireless.com/t5/Unleashed/Unleashed-R510-CVE-s/m-p/113597#M7283</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;We have had a cyber security scan and the Ruckus is showing 5 critical CVE's, I have updated the unleashed network to the latest version 200.15.6.212.27 but the CVE's still show. Are these false or do i need to do something else to fix? All point to&amp;nbsp;&lt;SPAN&gt;dropbear_ssh_project.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;CVE-2020-36254 -&amp;nbsp;scp.c in Dropbear before 2020.79 mishandles the filename of . or an empty filename, a related issue to CVE-2018-20685&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;CVE-2021-36369 -&amp;nbsp;An issue was discovered in Dropbear through 2020.81. Due to a non-RFC-compliant check of the available authentication methods in the client-side SSH code, it is possible for an SSH server to change the login process in its favor. This attack can bypass additional security measures such as FIDO2 tokens or SSH-Askpass. Thus, it allows an attacker to abuse a forwarded agent for logging on to another server unnoticed&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;CVE-2023-48795 -&amp;nbsp;The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;CVE-2018-15599 -&amp;nbsp;The recv_msg_userauth_request function in svr-auth.c in Dropbear through 2018.76 is prone to a user enumeration vulnerability because username validity affects how fields in SSH_MSG_USERAUTH messages are handled, a similar issue to CVE-2018-15473 in an unrelated codebase&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;CVE-2019-12953 -&amp;nbsp;Dropbear 2011.54 through 2018.76 has an inconsistent failure delay that may lead to revealing valid usernames, a different issue than CVE-2018-15599&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 30 Mar 2026 22:21:02 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/Unleashed/Unleashed-R510-CVE-s/m-p/113597#M7283</guid>
      <dc:creator>KazTech</dc:creator>
      <dc:date>2026-03-30T22:21:02Z</dc:date>
    </item>
    <item>
      <title>Re: Unleashed R510 CVE's</title>
      <link>https://community.ruckuswireless.com/t5/Unleashed/Unleashed-R510-CVE-s/m-p/113602#M7284</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;CVE-2020-36254 :&amp;nbsp;&lt;/STRONG&gt;Our AP should not be vulnerable to CVE-2020-36254 for the following reason:&lt;BR /&gt;1. Our scp binary should be from openssh rather than dropbear, which is not vulnerable to the above CVE.&lt;BR /&gt;2. Even if the binary is from dropbear, there is no interface to scp from standard UI (our box is a closed system), hence the vulnerability shouldn’t be exploitable.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;CVE-2021-36369 :&amp;nbsp;&lt;/STRONG&gt;Currently, the Dropbear version in the firmware (200.18) is v2018.76 which is the same as the firmware 200.15.6.212.20 and 200.15.6.212.27. And there is no plan to upgrade to version 2020.81. Instead, we will be replacing Dropbear with OpenSSH in release (200.19), which will include a fix.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;CVE-2023-48795 :&amp;nbsp;&lt;/STRONG&gt; Re&lt;SPAN&gt;fers to a vulnerability in OpenSSH, potentially allowing attackers to exploit weaknesses in SSH encryption algorithms AP's do not support the vulnerable cipher and therefore are not affected by this. Thus, unleashed is not vulnerable to CVE-2023-48795&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN&gt;CVE-2019-12953,&amp;nbsp;&lt;/SPAN&gt;CVE-2018-15599 :&amp;nbsp;&lt;/STRONG&gt;Dropbear 2011.54 through 2018.76 has an inconsistent failure delay that may lead to revealing valid usernames.&lt;BR /&gt;Our product Ruckus unleashed is not using the Dropbear password verify so its not vulnerable to this.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Overall, 200.19 will be using OpenSSH instead of Dropbear, so upgrading to 200.19 will be a feasible solution.&lt;/P&gt;</description>
      <pubDate>Tue, 31 Mar 2026 03:14:50 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/Unleashed/Unleashed-R510-CVE-s/m-p/113602#M7284</guid>
      <dc:creator>sanjay_kumar</dc:creator>
      <dc:date>2026-03-31T03:14:50Z</dc:date>
    </item>
  </channel>
</rss>

