<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Question R720 ZD 1200 Version 10.0.1.0 build 61 in ZoneDirector</title>
    <link>https://community.ruckuswireless.com/t5/ZoneDirector/Question-R720-ZD-1200-Version-10-0-1-0-build-61/m-p/33279#M6171</link>
    <description>Hello E.S.,&lt;BR /&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp; Those are both viable descriptions of our ZoneDirector 10.0.1 (MR1) firmware, which is 10.0.1.0.61 complete version number (build 61).&amp;nbsp; &lt;BR /&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp; Please find our Security Bulletin 092917 that describes the Authenticated Root Command Injection vulnerabilities (and the two CVE issues you mention) listed on our Support Security page:&lt;BR /&gt;&lt;A href="https://support.ruckuswireless.com/security_bulletins/4" rel="nofollow" target="_blank" title="Link https//supportruckuswirelesscom/security_bulletins/4"&gt;https://support.ruckuswireless.com/security_bulletins/4&lt;/A&gt;&amp;nbsp; &lt;BR /&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp; And the Text or .PDF bulletin describes the issue(s), and that ZoneDirector code 10.0.1.0.17 (and later), have been patched against any possible intrusion. The 10.0.1 (MR1) firmware you are asking about, is Safe from these vulnerabilities.&lt;BR /&gt;- Michael</description>
    <pubDate>Tue, 30 Oct 2018 17:01:11 GMT</pubDate>
    <dc:creator>michael_brado</dc:creator>
    <dc:date>2018-10-30T17:01:11Z</dc:date>
    <item>
      <title>Question R720 ZD 1200 Version 10.0.1.0 build 61</title>
      <link>https://community.ruckuswireless.com/t5/ZoneDirector/Question-R720-ZD-1200-Version-10-0-1-0-build-61/m-p/33278#M6170</link>
      <description>Hello,&amp;nbsp;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;What is the difference of this version&amp;nbsp;10.0.1.0 build 61 to&amp;nbsp;10.0.1.0 .61(MR1)&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;Is this Version&amp;nbsp;10.0.1.0 build 61 vulnerable to&amp;nbsp;CVE-2017-6223, CVE-
2017-6224?</description>
      <pubDate>Tue, 30 Oct 2018 08:21:06 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ZoneDirector/Question-R720-ZD-1200-Version-10-0-1-0-build-61/m-p/33278#M6170</guid>
      <dc:creator>shiela_dimzon</dc:creator>
      <dc:date>2018-10-30T08:21:06Z</dc:date>
    </item>
    <item>
      <title>Re: Question R720 ZD 1200 Version 10.0.1.0 build 61</title>
      <link>https://community.ruckuswireless.com/t5/ZoneDirector/Question-R720-ZD-1200-Version-10-0-1-0-build-61/m-p/33279#M6171</link>
      <description>Hello E.S.,&lt;BR /&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp; Those are both viable descriptions of our ZoneDirector 10.0.1 (MR1) firmware, which is 10.0.1.0.61 complete version number (build 61).&amp;nbsp; &lt;BR /&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp; Please find our Security Bulletin 092917 that describes the Authenticated Root Command Injection vulnerabilities (and the two CVE issues you mention) listed on our Support Security page:&lt;BR /&gt;&lt;A href="https://support.ruckuswireless.com/security_bulletins/4" rel="nofollow" target="_blank" title="Link https//supportruckuswirelesscom/security_bulletins/4"&gt;https://support.ruckuswireless.com/security_bulletins/4&lt;/A&gt;&amp;nbsp; &lt;BR /&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp; And the Text or .PDF bulletin describes the issue(s), and that ZoneDirector code 10.0.1.0.17 (and later), have been patched against any possible intrusion. The 10.0.1 (MR1) firmware you are asking about, is Safe from these vulnerabilities.&lt;BR /&gt;- Michael</description>
      <pubDate>Tue, 30 Oct 2018 17:01:11 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ZoneDirector/Question-R720-ZD-1200-Version-10-0-1-0-build-61/m-p/33279#M6171</guid>
      <dc:creator>michael_brado</dc:creator>
      <dc:date>2018-10-30T17:01:11Z</dc:date>
    </item>
  </channel>
</rss>

