<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: FragAttacks Security Vulnerability - RUCKUS Technical Support Response Center in Wireless Questions and Best Practices</title>
    <link>https://community.ruckuswireless.com/t5/Wireless-Questions-and-Best/FragAttacks-Security-Vulnerability-RUCKUS-Technical-Support/m-p/28473#M1312</link>
    <description>&lt;DIV&gt;I have the this scenario:&lt;/DIV&gt;
&lt;DIV&gt;Ruckus Virtual SmartZone - High Scale&lt;/DIV&gt;
&lt;DIV&gt;Controller Version 5.1.1.0.598&lt;/DIV&gt;
&lt;DIV&gt;&lt;/DIV&gt;
&lt;DIV&gt;My question is, Do I have to upgrade my controller to 5.2.2 to apply the scg-ap-5.2.2.0-1016.patch (frag attack patch)?&lt;/DIV&gt;
&lt;DIV&gt;&lt;/DIV&gt;
&lt;DIV&gt;Thanks!&lt;/DIV&gt;</description>
    <pubDate>Tue, 10 Aug 2021 16:09:39 GMT</pubDate>
    <dc:creator>camilo_avancini</dc:creator>
    <dc:date>2021-08-10T16:09:39Z</dc:date>
    <item>
      <title>FragAttacks Security Vulnerability - RUCKUS Technical Support Response Center</title>
      <link>https://community.ruckuswireless.com/t5/Wireless-Questions-and-Best/FragAttacks-Security-Vulnerability-RUCKUS-Technical-Support/m-p/28430#M1269</link>
      <description>&lt;P style="margin: 0;"&gt;At 11:00am PDT today, the Wi-Fi Alliance announced a new Wi-Fi security vulnerability, &lt;A href="https://www.wi-fi.org/security-update-fragmentation" target="_blank" rel="noopener"&gt;FragAttacks&lt;/A&gt;.&lt;/P&gt;
&lt;P style="margin: 0;"&gt;&lt;/P&gt;
&lt;P style="margin: 0;"&gt;The &lt;STRONG&gt;&lt;A href="https://support.ruckuswireless.com/fragattacks-ruckus-technical-support-response-center"&gt;FragAttacks - RUCKUS Technical Support Response Center&lt;/A&gt;&lt;/STRONG&gt; is our central web page that brings together all of the RUCKUS-related information you need to address FragAttacks, including:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;A href="https://support.ruckuswireless.com/security_bulletins/310"&gt;Security Bulletin 20210511 v1.0 - RUCKUS AP Aggregation And Fragmentation Attacks Vulnerability (aka “FragAttacks”) &lt;/A&gt;&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="http://www.commscope.com/fragattacks-commscope-ruckus-resource-center/faqs"&gt;&lt;STRONG&gt;FragAttacks Vulnerability FAQs&lt;/STRONG&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;A href="https://support.ruckuswireless.com/articles/000011636"&gt;Recommendations to Protect Wi-Fi Traffic: Management, Control, and Data from Vulnerability Exploitation&lt;/A&gt; - KBA # 000011636&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P style="margin: 0;"&gt;In addition, the RUCKUS senior technology leadership has prepared resources to explain the nature and impact of the FragAttacks vulnerabilities, including technical blogs, videos, and podcasts.&amp;nbsp; These are all linked on the &lt;STRONG&gt;&lt;A href="https://support.ruckuswireless.com/fragattacks-ruckus-technical-support-response-center"&gt;FragAttacks - RUCKUS Technical Support Response Center&lt;/A&gt;&lt;/STRONG&gt; web page.&lt;/P&gt;
&lt;P style="margin: 0;"&gt;&lt;/P&gt;
&lt;P style="margin: 0;"&gt;&lt;STRONG&gt;Please use this thread as a central location for your FragAttacks questions and concerns&lt;/STRONG&gt;.&amp;nbsp; Doing so will help to ensure that we can respond as quickly as possible to your issues as you raise them.&amp;nbsp;&lt;/P&gt;
&lt;P style="margin: 0;"&gt;&lt;/P&gt;
&lt;P style="margin: 0;"&gt;Thank you!&lt;/P&gt;
&lt;P style="margin: 0;"&gt;&lt;/P&gt;
&lt;P style="margin: 0;"&gt;Allan Grohe&lt;/P&gt;</description>
      <pubDate>Tue, 11 May 2021 18:06:19 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/Wireless-Questions-and-Best/FragAttacks-Security-Vulnerability-RUCKUS-Technical-Support/m-p/28430#M1269</guid>
      <dc:creator>grodog-prod</dc:creator>
      <dc:date>2021-05-11T18:06:19Z</dc:date>
    </item>
    <item>
      <title>Re: FragAttacks Security Vulnerability - RUCKUS Technical Support Response Center</title>
      <link>https://community.ruckuswireless.com/t5/Wireless-Questions-and-Best/FragAttacks-Security-Vulnerability-RUCKUS-Technical-Support/m-p/28432#M1271</link>
      <description>&lt;P style="margin: 0;"&gt;We are looking into this and will update soon.&lt;/P&gt;
&lt;P style="margin: 0;"&gt;&lt;/P&gt;
&lt;P style="margin: 0;"&gt;Thanks for the patience and cooperation.&lt;/P&gt;</description>
      <pubDate>Wed, 12 May 2021 13:01:40 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/Wireless-Questions-and-Best/FragAttacks-Security-Vulnerability-RUCKUS-Technical-Support/m-p/28432#M1271</guid>
      <dc:creator>syamantakomer</dc:creator>
      <dc:date>2021-05-12T13:01:40Z</dc:date>
    </item>
    <item>
      <title>Re: FragAttacks Security Vulnerability - RUCKUS Technical Support Response Center</title>
      <link>https://community.ruckuswireless.com/t5/Wireless-Questions-and-Best/FragAttacks-Security-Vulnerability-RUCKUS-Technical-Support/m-p/28433#M1272</link>
      <description>&lt;P style="margin: 0;"&gt;&lt;A href="https://forums.ruckuswireless.com/users/5f9169f549d3ca752488d141" style="text-decoration: 'none';" data-id="5f9169f549d3ca752488d141" data-username="syamantak_omer"&gt;@syamantak_omer&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0;"&gt;&lt;SPAN&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0;"&gt;&lt;SPAN&gt;&lt;SPAN&gt;Same issue and question for the lastest unleashed patch as well as the release notes are also behind a paywall.&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0;"&gt;&lt;SPAN&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0;"&gt;&lt;SPAN&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 12 May 2021 14:48:46 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/Wireless-Questions-and-Best/FragAttacks-Security-Vulnerability-RUCKUS-Technical-Support/m-p/28433#M1272</guid>
      <dc:creator>vesalius</dc:creator>
      <dc:date>2021-05-12T14:48:46Z</dc:date>
    </item>
    <item>
      <title>Re: FragAttacks Security Vulnerability - RUCKUS Technical Support Response Center</title>
      <link>https://community.ruckuswireless.com/t5/Wireless-Questions-and-Best/FragAttacks-Security-Vulnerability-RUCKUS-Technical-Support/m-p/28434#M1273</link>
      <description>&lt;P style="margin: 0;"&gt;Hi Harold,&lt;/P&gt;
&lt;P style="margin: 0;"&gt;&lt;/P&gt;
&lt;P style="margin: 0;"&gt;For Unleashed, you can upgrade directly from OTA server, once firmware is available.&lt;/P&gt;</description>
      <pubDate>Wed, 12 May 2021 15:04:16 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/Wireless-Questions-and-Best/FragAttacks-Security-Vulnerability-RUCKUS-Technical-Support/m-p/28434#M1273</guid>
      <dc:creator>syamantakomer</dc:creator>
      <dc:date>2021-05-12T15:04:16Z</dc:date>
    </item>
    <item>
      <title>Re: FragAttacks Security Vulnerability - RUCKUS Technical Support Response Center</title>
      <link>https://community.ruckuswireless.com/t5/Wireless-Questions-and-Best/FragAttacks-Security-Vulnerability-RUCKUS-Technical-Support/m-p/28435#M1274</link>
      <description>&lt;P style="margin: 0;"&gt;Hi All,&lt;/P&gt;
&lt;P style="margin: 0;"&gt;&lt;/P&gt;
&lt;P style="margin: 0;"&gt;As of today (12th May 2021), fix is available for below products/versions.&lt;/P&gt;
&lt;P style="margin: 0;"&gt;&lt;/P&gt;
&lt;P style="margin: 0;"&gt;For other products/versions, please follow &lt;A href="https://support.ruckuswireless.com/fragattacks-ruckus-technical-support-response-center" target="_blank" rel="noopener"&gt;FragAttacks technical support page&lt;/A&gt;.&lt;/P&gt;
&lt;P style="margin: 0;"&gt;&lt;/P&gt;
&lt;DIV style="overflow: auto;"&gt;
&lt;TABLE width="1115" border="1"&gt;
&lt;TBODY&gt;
&lt;TR style="font-style: inherit;"&gt;
&lt;TD width="171"&gt;&lt;STRONG&gt;Platform&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD width="79"&gt;&lt;STRONG&gt;Release&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD width="120"&gt;&lt;STRONG&gt;Target Patch Release Date&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD width="745"&gt;&lt;STRONG&gt;Download link and exact fix version&lt;/STRONG&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="171"&gt;RUCKUS SmartZone and&lt;BR /&gt;Virtual SmartZone&lt;/TD&gt;
&lt;TD&gt;5.2.2&lt;/TD&gt;
&lt;TD&gt;11-May-21&lt;/TD&gt;
&lt;TD&gt;&lt;A href="https://support.ruckuswireless.com/software_terms_and_conditions/2966-smartzone-ap-patch-for-post-5-2-2-gd-refresh"&gt;AP Patch 5.2.2.0.1016 must be applied to 5.2.2 GA controller version 5.2.2.0.317&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;RUCKUS ZoneDirector&lt;/TD&gt;
&lt;TD&gt;10.4.1&lt;/TD&gt;
&lt;TD&gt;10-May-21&lt;/TD&gt;
&lt;TD&gt;&lt;A href="https://support.ruckuswireless.com/software_terms_and_conditions/2967-zd1200-10-4-1-0-257-ga-refresh4-software-release"&gt;ZoneFlex 10.4.1.0.257 (GA Refresh4) Software Release for ZD1200&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;RUCKUS Unleashed&lt;/TD&gt;
&lt;TD&gt;200.9&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;10-May-21&lt;/TD&gt;
&lt;TD&gt;&lt;A href="https://community.ruckuswireless.com/Click%20here%20%3e%3e%20Go%20to%20Download%20%3e%3e%20Find%20your%20desired%20AP%20model%20and%20respective%20download%20link%20for%20200.9.10.4.243%20version"&gt;Click here &amp;gt;&amp;gt; Go to Download &amp;gt;&amp;gt; Find your desired AP model and respective download link for 200.9.10.4.243 version&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P style="margin: 0;"&gt;&lt;/P&gt;
&lt;P style="margin: 0;"&gt;&lt;STRONG&gt;Note: &lt;/STRONG&gt;Release notes may not have the information of FragAttacks fix, we will update release notes soon.&lt;/P&gt;
&lt;/DIV&gt;</description>
      <pubDate>Wed, 12 May 2021 18:30:36 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/Wireless-Questions-and-Best/FragAttacks-Security-Vulnerability-RUCKUS-Technical-Support/m-p/28435#M1274</guid>
      <dc:creator>syamantakomer</dc:creator>
      <dc:date>2021-05-12T18:30:36Z</dc:date>
    </item>
    <item>
      <title>Re: FragAttacks Security Vulnerability - RUCKUS Technical Support Response Center</title>
      <link>https://community.ruckuswireless.com/t5/Wireless-Questions-and-Best/FragAttacks-Security-Vulnerability-RUCKUS-Technical-Support/m-p/28436#M1275</link>
      <description>&lt;P style="margin: 0;"&gt;In addition to my previous comment, we are also updating our FragAttacks Technical Support Page and direct download links are also available there.&lt;/P&gt;</description>
      <pubDate>Wed, 12 May 2021 18:34:26 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/Wireless-Questions-and-Best/FragAttacks-Security-Vulnerability-RUCKUS-Technical-Support/m-p/28436#M1275</guid>
      <dc:creator>syamantakomer</dc:creator>
      <dc:date>2021-05-12T18:34:26Z</dc:date>
    </item>
    <item>
      <title>Re: FragAttacks Security Vulnerability - RUCKUS Technical Support Response Center</title>
      <link>https://community.ruckuswireless.com/t5/Wireless-Questions-and-Best/FragAttacks-Security-Vulnerability-RUCKUS-Technical-Support/m-p/28437#M1276</link>
      <description>&lt;P style="margin: 0;"&gt;I have updated all of the FragAttacks-related software images and release notes to be available to "All Users" instead of "Premium Support Users" only.&lt;/P&gt;
&lt;P style="margin: 0;"&gt;&lt;/P&gt;
&lt;P style="margin: 0;"&gt;I apologize for that oversight:&amp;nbsp; it was our intention when all of the files went live yesterday that they be available to all users, but the IT database publishing update also overwrote the All Users permission with the Premium permission.&amp;nbsp;&lt;/P&gt;
&lt;P style="margin: 0;"&gt;&lt;/P&gt;
&lt;P style="margin: 0;"&gt;Allan.&lt;/P&gt;</description>
      <pubDate>Wed, 12 May 2021 18:35:49 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/Wireless-Questions-and-Best/FragAttacks-Security-Vulnerability-RUCKUS-Technical-Support/m-p/28437#M1276</guid>
      <dc:creator>grodog-prod</dc:creator>
      <dc:date>2021-05-12T18:35:49Z</dc:date>
    </item>
    <item>
      <title>Re: FragAttacks Security Vulnerability - RUCKUS Technical Support Response Center</title>
      <link>https://community.ruckuswireless.com/t5/Wireless-Questions-and-Best/FragAttacks-Security-Vulnerability-RUCKUS-Technical-Support/m-p/28438#M1277</link>
      <description>&lt;P style="margin: 0;"&gt;Any plan to patch or advise for ZD 1100 &amp;amp; ZD 3000?&lt;/P&gt;
&lt;P style="margin: 0;"&gt;&lt;/P&gt;
&lt;P style="margin: 0;"&gt;Thanks.&lt;/P&gt;
&lt;P style="margin: 0;"&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 17 May 2021 02:56:22 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/Wireless-Questions-and-Best/FragAttacks-Security-Vulnerability-RUCKUS-Technical-Support/m-p/28438#M1277</guid>
      <dc:creator>hendri_marzuki</dc:creator>
      <dc:date>2021-05-17T02:56:22Z</dc:date>
    </item>
    <item>
      <title>Re: FragAttacks Security Vulnerability - RUCKUS Technical Support Response Center</title>
      <link>https://community.ruckuswireless.com/t5/Wireless-Questions-and-Best/FragAttacks-Security-Vulnerability-RUCKUS-Technical-Support/m-p/28439#M1278</link>
      <description>&lt;P style="margin: 0;"&gt;Hi Hendri,&lt;/P&gt;
&lt;P style="margin: 0;"&gt;&lt;/P&gt;
&lt;P style="margin: 0;"&gt;Please refer the &lt;A href="https://support.ruckuswireless.com/fragattacks-ruckus-technical-support-response-center" target="_blank" rel="noopener"&gt;support page&lt;/A&gt; and check if you can upgrade to closest supported firmware version.&lt;/P&gt;
&lt;P style="margin: 0;"&gt;&lt;/P&gt;
&lt;P style="margin: 0;"&gt;For ZD1100, we are checking with concerned team.&lt;/P&gt;
&lt;P style="margin: 0;"&gt;&lt;/P&gt;
&lt;P style="margin: 0;"&gt;As of now, you can upgrade to below versions (once available) to fix the issue.&lt;/P&gt;
&lt;P style="margin: 0;"&gt;&lt;/P&gt;
&lt;DIV&gt;&lt;IMG size="9963" contenttype="image/png" crossorigin="use-credentials" src="data:image/png;base64,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" unselectable="on" tabindex="-1" /&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;/DIV&gt;
&lt;DIV&gt;
&lt;DIV&gt;&lt;/DIV&gt;
&lt;/DIV&gt;</description>
      <pubDate>Mon, 17 May 2021 13:21:05 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/Wireless-Questions-and-Best/FragAttacks-Security-Vulnerability-RUCKUS-Technical-Support/m-p/28439#M1278</guid>
      <dc:creator>syamantakomer</dc:creator>
      <dc:date>2021-05-17T13:21:05Z</dc:date>
    </item>
    <item>
      <title>Re: FragAttacks Security Vulnerability - RUCKUS Technical Support Response Center</title>
      <link>https://community.ruckuswireless.com/t5/Wireless-Questions-and-Best/FragAttacks-Security-Vulnerability-RUCKUS-Technical-Support/m-p/28440#M1279</link>
      <description>&lt;P style="margin: 0;"&gt;Hi All,&lt;/P&gt;
&lt;P style="margin: 0;"&gt;&lt;/P&gt;
&lt;P style="margin: 0;"&gt;Fix for ZD 10.2.1 has been released on our support site.&lt;/P&gt;
&lt;P style="margin: 0;"&gt;&lt;/P&gt;
&lt;P style="margin: 0;"&gt;RUCKUS ZoneDirector 10.2.1.0.200 (MR1 Refresh7):&lt;/P&gt;
&lt;OL type="1" start="1"&gt;
&lt;LI&gt;&lt;SPAN&gt;ZD1200 @&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;A href="https://support.ruckuswireless.com/software/2995-zd1200-10-2-1-0-200-mr1-refresh7-software-release" target="_blank" rel="noopener noreferrer" data-auth="NotApplicable" data-linkindex="0"&gt;https://support.ruckuswireless.com/software/2995-zd1200-10-2-1-0-200-mr1-refresh7-software-release&lt;/A&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;ZD3000 @&amp;nbsp;&lt;A href="https://support.ruckuswireless.com/software/2996-zd3000-10-2-1-0-200-mr1-refresh7-software-release" target="_blank" rel="noopener noreferrer" data-auth="NotApplicable" data-linkindex="1"&gt;https://support.ruckuswireless.com/software/2996-zd3000-10-2-1-0-200-mr1-refresh7-software-release&lt;/A&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;MIBs @&amp;nbsp;&lt;A href="https://support.ruckuswireless.com/software/2997-zonedirector-10-2-1-0-200-mr1-refresh7-snmp-mibs-zip" target="_blank" rel="noopener noreferrer" data-auth="NotApplicable" data-linkindex="2"&gt;https://support.ruckuswireless.com/software/2997-zonedirector-10-2-1-0-200-mr1-refresh7-snmp-mibs-zip&lt;/A&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Release Notes&lt;BR /&gt;&lt;A href="https://support.ruckuswireless.com/documents/3729-zonedirector-10-2-1-mr1-refresh7-release-notes" target="_blank" rel="noopener noreferrer" data-auth="NotApplicable" data-linkindex="3"&gt;https://support.ruckuswireless.com/documents/3729-zonedirector-10-2-1-mr1-refresh7-release-notes&lt;/A&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P style="margin: 0;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="margin: 0;"&gt;Our FragAttacks support page also updated with this information.&lt;/P&gt;
&lt;P style="margin: 0;"&gt;&lt;/P&gt;
&lt;P style="margin: 0;"&gt;&lt;A href="https://support.ruckuswireless.com/fragattacks-ruckus-technical-support-response-center" target="_blank" rel="noopener noreferrer" data-auth="NotApplicable" data-linkindex="4"&gt;https://support.ruckuswireless.com/fragattacks-ruckus-technical-support-response-center&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 17 May 2021 15:44:28 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/Wireless-Questions-and-Best/FragAttacks-Security-Vulnerability-RUCKUS-Technical-Support/m-p/28440#M1279</guid>
      <dc:creator>syamantakomer</dc:creator>
      <dc:date>2021-05-17T15:44:28Z</dc:date>
    </item>
    <item>
      <title>Re: FragAttacks Security Vulnerability - RUCKUS Technical Support Response Center</title>
      <link>https://community.ruckuswireless.com/t5/Wireless-Questions-and-Best/FragAttacks-Security-Vulnerability-RUCKUS-Technical-Support/m-p/28441#M1280</link>
      <description>&lt;P style="margin: 0;"&gt;Hi All,&lt;/P&gt;
&lt;P style="margin: 0;"&gt;&lt;/P&gt;
&lt;P style="margin: 0;"&gt;Fix for ZD 10.0.1 has been released on our support site.&lt;/P&gt;
&lt;P style="margin: 0;"&gt;&lt;/P&gt;
&lt;P style="margin: 0;"&gt;ZoneDirector 10.0.1.0.146 MR1 software images to the Support Portal are as follows:&amp;nbsp;&lt;/P&gt;
&lt;OL type="1" start="1"&gt;
&lt;LI&gt;&lt;SPAN&gt;ZD5000 at&amp;nbsp;&lt;A href="https://support.ruckuswireless.com/software/3000-zd5000-10-0-1-0-146-mr1-refresh11-software-release" target="_blank" rel="noopener noreferrer" data-auth="NotApplicable" data-linkindex="0"&gt;https://support.ruckuswireless.com/software/3000-zd5000-10-0-1-0-146-mr1-refresh11-software-release&lt;/A&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;ZD3000 at&amp;nbsp;&lt;A href="https://support.ruckuswireless.com/software/2999-zd3000-10-0-1-0-146-mr1-refresh11-software-release" target="_blank" rel="noopener noreferrer" data-auth="NotApplicable" data-linkindex="1"&gt;https://support.ruckuswireless.com/software/2999-zd3000-10-0-1-0-146-mr1-refresh11-software-release&lt;/A&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;ZD1200 at&amp;nbsp;&lt;A href="https://support.ruckuswireless.com/software/2998-zd1200-10-0-1-0-146-mr1-refresh11-software-release" target="_blank" rel="noopener noreferrer" data-auth="NotApplicable" data-linkindex="2"&gt;https://support.ruckuswireless.com/software/2998-zd1200-10-0-1-0-146-mr1-refresh11-software-release&lt;/A&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;MIBs at&amp;nbsp;&lt;A href="https://support.ruckuswireless.com/software/3001-zonedirector-10-0-1-0-146-mr1-refresh11-snmp-mibs-zip" target="_blank" rel="noopener noreferrer" data-auth="NotApplicable" data-linkindex="3"&gt;https://support.ruckuswireless.com/software/3001-zonedirector-10-0-1-0-146-mr1-refresh11-snmp-mibs-zip&lt;/A&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Released notes can be found at &lt;A href="https://support.ruckuswireless.com/documents/3728-zonedirector-10-0-1-mr1-refresh11-release-notes" target="_blank" rel="noopener noreferrer" data-auth="NotApplicable" data-linkindex="4"&gt;https://support.ruckuswireless.com/documents/3728-zonedirector-10-0-1-mr1-refresh11-release-notes&lt;/A&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P style="margin: 0;"&gt;Our FragAttacks support page also updated with this information.&lt;/P&gt;
&lt;P style="margin: 0;"&gt;&lt;/P&gt;
&lt;P style="margin: 0;"&gt;&lt;A href="https://support.ruckuswireless.com/fragattacks-ruckus-technical-support-response-center" target="_blank" rel="noopener noreferrer" data-auth="NotApplicable" data-linkindex="4"&gt;https://support.ruckuswireless.com/fragattacks-ruckus-technical-support-response-center&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 17 May 2021 16:46:07 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/Wireless-Questions-and-Best/FragAttacks-Security-Vulnerability-RUCKUS-Technical-Support/m-p/28441#M1280</guid>
      <dc:creator>syamantakomer</dc:creator>
      <dc:date>2021-05-17T16:46:07Z</dc:date>
    </item>
    <item>
      <title>Re: FragAttacks Security Vulnerability - RUCKUS Technical Support Response Center</title>
      <link>https://community.ruckuswireless.com/t5/Wireless-Questions-and-Best/FragAttacks-Security-Vulnerability-RUCKUS-Technical-Support/m-p/28442#M1281</link>
      <description>&lt;P style="margin: 0;"&gt;Hi,&lt;/P&gt;
&lt;P style="margin: 0;"&gt;I want to emphasize, that normally new firmware can't be installed if ZD isn't under active support. In Release Note is stated that for some time this check is suspended, to allow patching all systems, with or without support.&lt;/P&gt;
&lt;P style="margin: 0;"&gt;It is really very responsible step from Ruckus and must be clearly stated in BIG LETTERS on the same page with list of download links to encourage immediate action!&amp;nbsp;&lt;/P&gt;
&lt;P style="margin: 0;"&gt;&lt;/P&gt;
&lt;P style="margin: 0;"&gt;What about version 9.8-9.9 --&amp;nbsp; as Ruckus APs have a very long useful life, there are still many 802.11n networks in operation and even 802.11g - it is extreme, but there is a network with ZF2942 APs (in 4star hotel, installed by us in 2007, and still "good enough not to be replaced yet" for hotel management!). Of cause, these networks have no support, as they can't upgrade to the latest versions anyway (APs and even controllers are not supported).&lt;/P&gt;
&lt;P style="margin: 0;"&gt;Are there any plans to get patches to version 9.9 or similar, which allows managing older APs? At least for version supporting ZF7372/52, ZF7982, etc.&lt;/P&gt;
&lt;P style="margin: 0;"&gt;I know that it is better to replace them, but it is not going to happen for quit a while.&amp;nbsp; As far as 802.11n service is still acceptable, they will stay around, secure or not.&lt;/P&gt;
&lt;P style="margin: 0;"&gt;&lt;/P&gt;
&lt;P style="margin: 0;"&gt;There is, of cause, question about patch efficiency --&amp;nbsp; as you can never guarantee that all devices connected to network are patched, is patching a network really efficient? I understand, that without patching APs, you can't fix the vulnerability at all, but if there is a big part of unpatched clients,&amp;nbsp; will this provide any real improvement?&lt;/P&gt;
&lt;P style="margin: 0;"&gt;&lt;/P&gt;
&lt;P style="margin: 0;"&gt;For really critical networks -- is there a way to block vulnerable clients on WiFi level, or the only chance for that is NAC?&lt;/P&gt;
&lt;P style="margin: 0;"&gt;&lt;/P&gt;
&lt;P style="margin: 0;"&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 17 May 2021 19:47:17 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/Wireless-Questions-and-Best/FragAttacks-Security-Vulnerability-RUCKUS-Technical-Support/m-p/28442#M1281</guid>
      <dc:creator>eizens_putnins</dc:creator>
      <dc:date>2021-05-17T19:47:17Z</dc:date>
    </item>
    <item>
      <title>Re: FragAttacks Security Vulnerability - RUCKUS Technical Support Response Center</title>
      <link>https://community.ruckuswireless.com/t5/Wireless-Questions-and-Best/FragAttacks-Security-Vulnerability-RUCKUS-Technical-Support/m-p/28443#M1282</link>
      <description>&lt;P style="margin: 0;"&gt;Hi &lt;A href="https://forums.ruckuswireless.com/users/5f9169ec49d3ca752488a750" style="text-decoration: 'none';" data-id="5f9169ec49d3ca752488a750" data-username="eizens_putnins"&gt;@eizens_putnins&lt;/A&gt;&lt;SPAN&gt; ,&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0;"&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0;"&gt;&lt;SPAN&gt;Most of the queries above are already answered in our FragAttack support page.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0;"&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0;"&gt;&lt;SPAN&gt;Please refer the page from &lt;A href="https://support.ruckuswireless.com/fragattacks-ruckus-technical-support-response-center" target="_blank" rel="noopener"&gt;here&lt;/A&gt;.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0;"&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0;"&gt;&lt;SPAN&gt;I am trying to answer a few queries here.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0;"&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;SPAN&gt;Yes you can upgrade the ZD even if you don't have support entitlement. Try to sync license online from ZD, or reachout to support and request for temporary entitlement.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Without patching APs and clients, fix is useless, so yes, both side devices needs to be patched.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;However, there are some vulnerabilities which can be patched just by APs but not all, hence patching both sides is strongly recommended.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;&lt;SPAN&gt;It could be hard to patch already EOS/EOL devices. &lt;/SPAN&gt;I am still checking this internally.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P style="margin: 0;"&gt;&lt;SPAN&gt;You can refer detailed information on FragAttach support page.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 17 May 2021 20:23:37 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/Wireless-Questions-and-Best/FragAttacks-Security-Vulnerability-RUCKUS-Technical-Support/m-p/28443#M1282</guid>
      <dc:creator>syamantakomer</dc:creator>
      <dc:date>2021-05-17T20:23:37Z</dc:date>
    </item>
    <item>
      <title>Re: FragAttacks Security Vulnerability - RUCKUS Technical Support Response Center</title>
      <link>https://community.ruckuswireless.com/t5/Wireless-Questions-and-Best/FragAttacks-Security-Vulnerability-RUCKUS-Technical-Support/m-p/28444#M1283</link>
      <description>&lt;P style="margin: 0;"&gt;Just to clarify, because the FragAttacks report is really that complex and complicated. The report contains 12 distinct vulnerabilities and some are targeted at APs, some are at clients, and some are at both. To prevent all 12 CVE's contained in the report, both APs and client devices need to be patched. Patching just the APs will prevent some of the vulnerabilities, but not all of them. It will, however, reduce the attack vectors available, especially with older client devices that might not get patched thanks to a lot of different factors.&lt;BR /&gt;&lt;BR /&gt;For those critical networks, refer to this page from the support site for additional help &lt;A href="https://www.commscope.com/fragattacks-commscope-ruckus-resource-center/wifi-fragattacks-what-you-need-to-know/" target="_blank" rel="noopener"&gt;https://www.commscope.com/fragattacks-commscope-ruckus-resource-center/wifi-fragattacks-what-you-need-to-know/&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;For those who want to get even more into the attacks, you can also check out this post-https://jimswirelessworld.wordpress.com/2021/05/11/fragattacks-just-reinforces-the-it-depends-complexity-of-wi-fi/&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 17 May 2021 21:13:46 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/Wireless-Questions-and-Best/FragAttacks-Security-Vulnerability-RUCKUS-Technical-Support/m-p/28444#M1283</guid>
      <dc:creator>jim_palmer</dc:creator>
      <dc:date>2021-05-17T21:13:46Z</dc:date>
    </item>
    <item>
      <title>Re: FragAttacks Security Vulnerability - RUCKUS Technical Support Response Center</title>
      <link>https://community.ruckuswireless.com/t5/Wireless-Questions-and-Best/FragAttacks-Security-Vulnerability-RUCKUS-Technical-Support/m-p/28445#M1284</link>
      <description>&lt;P style="margin: 0;"&gt;Thank you! Much appreciated!&lt;/P&gt;</description>
      <pubDate>Mon, 17 May 2021 21:53:54 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/Wireless-Questions-and-Best/FragAttacks-Security-Vulnerability-RUCKUS-Technical-Support/m-p/28445#M1284</guid>
      <dc:creator>hendri_marzuki</dc:creator>
      <dc:date>2021-05-17T21:53:54Z</dc:date>
    </item>
    <item>
      <title>Re: FragAttacks Security Vulnerability - RUCKUS Technical Support Response Center</title>
      <link>https://community.ruckuswireless.com/t5/Wireless-Questions-and-Best/FragAttacks-Security-Vulnerability-RUCKUS-Technical-Support/m-p/28446#M1285</link>
      <description>&lt;P style="margin: 0;"&gt;Hi All,&lt;/P&gt;
&lt;P style="margin: 0;"&gt;&lt;/P&gt;
&lt;P style="margin: 0;"&gt;Fix for Unleashed 200.7 has been released on our support site.&lt;/P&gt;
&lt;P style="margin: 0;"&gt;&lt;/P&gt;
&lt;P style="margin: 0;"&gt;For different AP models, Unleashed 200.7.10.202.127 MR6 software images can be found on below link.&lt;/P&gt;
&lt;P style="margin: 0;"&gt;&lt;/P&gt;
&lt;P style="margin: 0;"&gt;&lt;A href="https://support.ruckuswireless.com/software?query=200.7.10.202.127" target="_blank" rel="noopener"&gt;https://support.ruckuswireless.com/software?query=200.7.10.202.127&lt;/A&gt;&lt;/P&gt;
&lt;P style="margin: 0;"&gt;&lt;/P&gt;
&lt;DIV role="presentation"&gt;
&lt;DIV&gt;
&lt;P style="margin: 0;"&gt;Our FragAttacks support page also updated with this information.&lt;/P&gt;
&lt;P style="margin: 0;"&gt;&lt;/P&gt;
&lt;P style="margin: 0;"&gt;&lt;A href="https://support.ruckuswireless.com/fragattacks-ruckus-technical-support-response-center" target="_blank" rel="noopener noreferrer" data-auth="NotApplicable" data-linkindex="4"&gt;https://support.ruckuswireless.com/fragattacks-ruckus-technical-support-response-center&lt;/A&gt;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;</description>
      <pubDate>Tue, 18 May 2021 15:20:56 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/Wireless-Questions-and-Best/FragAttacks-Security-Vulnerability-RUCKUS-Technical-Support/m-p/28446#M1285</guid>
      <dc:creator>syamantakomer</dc:creator>
      <dc:date>2021-05-18T15:20:56Z</dc:date>
    </item>
    <item>
      <title>Re: FragAttacks Security Vulnerability - RUCKUS Technical Support Response Center</title>
      <link>https://community.ruckuswireless.com/t5/Wireless-Questions-and-Best/FragAttacks-Security-Vulnerability-RUCKUS-Technical-Support/m-p/28447#M1286</link>
      <description>&lt;P style="margin: 0;"&gt;I see firmware branch 10.3.x isn't mentioned. We have a ZD 1200 with R700 APs on this branch.&lt;/P&gt;
&lt;P style="margin: 0;"&gt;&lt;/P&gt;
&lt;P style="margin: 0;"&gt;Any mention releasing fix for the 10.3.x ZD branch?&lt;/P&gt;
&lt;P style="margin: 0;"&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 18 May 2021 15:53:17 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/Wireless-Questions-and-Best/FragAttacks-Security-Vulnerability-RUCKUS-Technical-Support/m-p/28447#M1286</guid>
      <dc:creator>alexandre_jablo</dc:creator>
      <dc:date>2021-05-18T15:53:17Z</dc:date>
    </item>
    <item>
      <title>Re: FragAttacks Security Vulnerability - RUCKUS Technical Support Response Center</title>
      <link>https://community.ruckuswireless.com/t5/Wireless-Questions-and-Best/FragAttacks-Security-Vulnerability-RUCKUS-Technical-Support/m-p/28448#M1287</link>
      <description>&lt;P style="margin: 0;"&gt;Just FYI, as informed by syamantak_omer, I could&lt;SPAN&gt; upgrade the ZD even if I don't have support entitlement. Just download the img file, then upgrade. Mine automatically given 30 days Support after the upgrade.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0;"&gt;&lt;SPAN&gt;Or contact Support where they'll give grace period support file to upload to ZD.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 18 May 2021 21:53:03 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/Wireless-Questions-and-Best/FragAttacks-Security-Vulnerability-RUCKUS-Technical-Support/m-p/28448#M1287</guid>
      <dc:creator>hendri_marzuki</dc:creator>
      <dc:date>2021-05-18T21:53:03Z</dc:date>
    </item>
    <item>
      <title>Re: FragAttacks Security Vulnerability - RUCKUS Technical Support Response Center</title>
      <link>https://community.ruckuswireless.com/t5/Wireless-Questions-and-Best/FragAttacks-Security-Vulnerability-RUCKUS-Technical-Support/m-p/28449#M1288</link>
      <description>&lt;P style="margin: 0;"&gt;Hi &lt;A href="https://forums.ruckuswireless.com/users/60a1db5593de84003be57e87" style="text-decoration: 'none';" data-id="60a1db5593de84003be57e87" data-username="hendri_marzuki"&gt;@hendri_marzuki&lt;/A&gt;&lt;SPAN&gt; ,&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0;"&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0;"&gt;&lt;SPAN&gt;Thanks for the feedback and good to know that you were able to upgrade your ZD.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 18 May 2021 21:56:08 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/Wireless-Questions-and-Best/FragAttacks-Security-Vulnerability-RUCKUS-Technical-Support/m-p/28449#M1288</guid>
      <dc:creator>syamantakomer</dc:creator>
      <dc:date>2021-05-18T21:56:08Z</dc:date>
    </item>
    <item>
      <title>Re: FragAttacks Security Vulnerability - RUCKUS Technical Support Response Center</title>
      <link>https://community.ruckuswireless.com/t5/Wireless-Questions-and-Best/FragAttacks-Security-Vulnerability-RUCKUS-Technical-Support/m-p/28450#M1289</link>
      <description>&lt;P style="margin: 0;"&gt;Hi Alaxander,&lt;/P&gt;
&lt;P style="margin: 0;"&gt;&lt;/P&gt;
&lt;P style="margin: 0;"&gt;Could you confirm how many APs you have on this ZD1200?&lt;/P&gt;</description>
      <pubDate>Tue, 18 May 2021 21:58:16 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/Wireless-Questions-and-Best/FragAttacks-Security-Vulnerability-RUCKUS-Technical-Support/m-p/28450#M1289</guid>
      <dc:creator>syamantakomer</dc:creator>
      <dc:date>2021-05-18T21:58:16Z</dc:date>
    </item>
  </channel>
</rss>

