<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Dropbear SSH Server vulnerability in ZoneDirector</title>
    <link>https://community.ruckuswireless.com/t5/ZoneDirector/Dropbear-SSH-Server-vulnerability/m-p/15636#M3407</link>
    <description>Is the dropbear SSH Server vulnerability patch included in ZD1100 9.10.2.0.63 Software Release?&lt;BR /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;I am currently on version 9.7.2.0 build 20&lt;BR /&gt;&lt;BR /&gt;Thanks</description>
    <pubDate>Fri, 11 Jan 2019 15:07:04 GMT</pubDate>
    <dc:creator>andy_styring</dc:creator>
    <dc:date>2019-01-11T15:07:04Z</dc:date>
    <item>
      <title>Dropbear SSH Server vulnerability</title>
      <link>https://community.ruckuswireless.com/t5/ZoneDirector/Dropbear-SSH-Server-vulnerability/m-p/15636#M3407</link>
      <description>Is the dropbear SSH Server vulnerability patch included in ZD1100 9.10.2.0.63 Software Release?&lt;BR /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;I am currently on version 9.7.2.0 build 20&lt;BR /&gt;&lt;BR /&gt;Thanks</description>
      <pubDate>Fri, 11 Jan 2019 15:07:04 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ZoneDirector/Dropbear-SSH-Server-vulnerability/m-p/15636#M3407</guid>
      <dc:creator>andy_styring</dc:creator>
      <dc:date>2019-01-11T15:07:04Z</dc:date>
    </item>
    <item>
      <title>Re: Dropbear SSH Server vulnerability</title>
      <link>https://community.ruckuswireless.com/t5/ZoneDirector/Dropbear-SSH-Server-vulnerability/m-p/15637#M3408</link>
      <description>Hi Andy,&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;You can check the&amp;nbsp;&lt;A alt="" href="https://www.ruckuswireless.com/security" name="" rel="nofollow" target="" title="Link httpswwwruckuswirelesscomsecurity" type="" value=""&gt;https://www.ruckuswireless.com/security&lt;/A&gt;&amp;nbsp;page for any info regarding dropbear.&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;Kind regards&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;Martin&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;</description>
      <pubDate>Fri, 11 Jan 2019 16:45:43 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ZoneDirector/Dropbear-SSH-Server-vulnerability/m-p/15637#M3408</guid>
      <dc:creator>martin_martin</dc:creator>
      <dc:date>2019-01-11T16:45:43Z</dc:date>
    </item>
    <item>
      <title>Re: Dropbear SSH Server vulnerability</title>
      <link>https://community.ruckuswireless.com/t5/ZoneDirector/Dropbear-SSH-Server-vulnerability/m-p/15638#M3409</link>
      <description>Hello Andy, &lt;BR /&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp; We've had other tickets/requests like yours too. The CVE-2017-9079 dropbear issue is fixed in ZD 10.0+, but unfortunately ZD1100 last supported release is 9.10.x, and changes will not be back-ported. &lt;BR /&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp; Other customers had to upgrade to ZD1200 model controllers if this is your concern. The security team reports this is concidered a minor vulnerability, with a CVSS score of 4.7, and exploitability score of 1.0.</description>
      <pubDate>Fri, 11 Jan 2019 17:26:58 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ZoneDirector/Dropbear-SSH-Server-vulnerability/m-p/15638#M3409</guid>
      <dc:creator>michael_brado</dc:creator>
      <dc:date>2019-01-11T17:26:58Z</dc:date>
    </item>
  </channel>
</rss>

