I've started scanning some of our Ruck servers with Rapid7 and it's showing HTTP OPTIONS and DELETE methods as active vulnerabilities. I can deal with these in IIS, nginx, or Apache, but I have no idea how to approach this within Ruckus' software. We're on version 126.96.36.199.935 and will be upgrading soon. Any advice would be greatly appreciated. Thanks!
Hi @publicwifi 188.8.131.52.935 is the vSZ version, you mean you are going to upgrade from 184.108.40.206.935 to Unleashed version? If yes, I would recommend you to open a support case and provide the complete report of the scanning report so that we can review and provide the solution to fix the issue.