What is Ruckus doing to mitigate the potential infection of APs with the Chameleon Wi-Fi access point virus? See this link for details on the virus: http://tinyurl.com/kg3h9wr
Our security folks say "nothing new" - the exploit requires weak infrastructure security which no production network should allow. Normal best-practice security hygiene protects against it.
My concern is a have a lot of Customers in the hospitality business that run unencrypted Wi-Fi for ease of use of guests. Does Chameleon put these Customers at risk?