03-11-2025 02:33 AM
Hello,
On a recent pen test, all the APs on our network (10 in total) are flagged with CVE-2023-48795. We've updated to the latest firmware of 200.17.7.0.152 but it's still the same.
Please can you advise? is it possible to turn off ssh if there is no fix but it's quite an old cve.
thanks
MW
03-16-2025 02:11 PM
I would email support or fill out the support form and bug them until they reply to your specific security issue. Please reply back here with what they do about it when you get a satisfactory reply.
03-17-2025 02:15 AM
annoyingly we dont have a support contract any longer so Im unable to speak to them directly.
03-18-2025 06:48 PM
You can contact them directly like anyone else. There is a support form in the Unleashed web GUI and app.
03-18-2025 05:11 PM
I looked up the CVE:
https://nvd.nist.gov/vuln/detail/CVE-2023-48795
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48795
Is the solution for Ruckus to simply upgrade whatever SSH server they are using to the newest version (that addresses the vulnerability)?
Re: your second question, I looked up the CLI Reference Guide, and I don't see a way to disable SSH, because I assume by doing so there would be no way to re-enable it.
Hope Ruckus team gets this, as it seems like the hotfix is just to upgrade the SSH server in Unleashed to the latest version.