Security

Report a potential issue: [email protected]

The Ruckus Security Incident Response Policy


Ruckus response to the WPA2 (KRACK) vulnerability:
Ruckus Wireless Support Resource Center

The RUCKUS Product Security Team is responsible for researching, analyzing and responding to security incident reports related to Ruckus products. This team is the first point of contact for all security incident reports and works directly with Ruckus customers, security researchers, government organizations, consultants, industry security organizations, and other vendors to identify security issues with Ruckus products. This team is also responsible for publishing security advisories and communicating with outside entities regarding mitigation steps for addressing particular security issues with Ruckus products.

Reporting a Security Issue to Ruckus

Ruckus encourages individuals and organizations to report all Ruckus-related product related vulnerabilities and security issues directly to Ruckus via our email alias: [email protected].

A link to the Ruckus Security Incident Response Policy is available here.

Please provide a detailed description of the issue along with sufficient information to reasonably enable Ruckus to reproduce the issue. Please also include a technical contact, list of Ruckus products affected and any other helpful information such as logs and console messages etc.

If you are a currently experiencing a network outage or need help configuring a security feature, please contact Ruckus via any of the contact methods listed on our Contact page.

Ruckus highly recommends protecting the email communication with the PGP key below for encrypting any sensitive information sent to Ruckus.

To send the confidential information always use PGP Keys only. Please ask for the key info and keys by sending email to [email protected].

try NEW advanced search
ID Title Version Release Date Edit Date
20180917 Automatic DNS Registration and Proxy Autodiscovery Vulnerabilities (VU#598349) 1.0 September 17, 2018 September 17, 2018
20181102 Libssh Vulnerabilities - CVE-2018-10933 1.0 November 02, 2018 November 02, 2018
20181205 PortSmash Side-Channel Vulnerability (CVE-2018-5407) 1.0 December 05, 2018 December 05, 2018
20190412 Dragonblood Vulnerabilities - VU#871675 1.0 April 12, 2019 April 12, 2019
20190528 Zombieload, RIDL, and Fallout Vulnerabilities (CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2018-11091) 1.0 May 28, 2019 May 28, 2019
20190603 Ruckus SmartZone Privilege Escalation Vulnerability (CVE-2019-11630) 1.2 June 03, 2019 August 12, 2019
20190815 TCP SACK Panic - Kernel Vulnerability (CVE-2019-11477, CVE-2019-11478, CVE-2019-11479) 1.2 August 15, 2019 January 08, 2020
20191224 ZoneDirector and Unleashed Unauthenticated Remote Code Execution and Other Vulnerabilities 1.2 December 24, 2019 January 06, 2020
20200205 IoT Controller remote unauthenticated API execution vulnerability (CVE-2020-8005) 1.0 February 05, 2020 February 05, 2020
2021051 RUCKUS AP Aggregation And Fragmentation Attacks Vulnerability (aka “FragAttacks”) 1.0 May 11, 2021 May 11, 2021
832024 QAtesting_UAT_Ignore October 25, 2024 October 18, 2024
11082024 QAtesting_UAT_Ignore 1 November 08, 2024 November 08, 2024

Working...Please wait

This is here to prevent you from accidentally submitting twice.

The page will automatically refresh.

Alert!!

Close