What is Ruckus doing to mitigate the potential infection of APs with the Chameleon Wi-Fi access point virus? See this link for details on the virus: http://tinyurl.com/kg3h9wr
- 2 Posts
- 0 Reply Likes
Posted 6 years ago
- 860 Posts
- 52 Reply Likes
For the truly paranoid, I've validated the link above is legit ;)
I've asked our security team to help address the concern. Stay tuned.
I've asked our security team to help address the concern. Stay tuned.
- 860 Posts
- 52 Reply Likes
Our security folks say "nothing new" - the exploit requires weak infrastructure security which no production network should allow. Normal best-practice security hygiene protects against it.
- 2 Posts
- 0 Reply Likes
My concern is a have a lot of Customers in the hospitality business that run unencrypted Wi-Fi for ease of use of guests. Does Chameleon put these Customers at risk?
- 860 Posts
- 52 Reply Likes
The exploit relies on well known default passwords, so good password practices on the controller take care of that.
Related Categories
-
ZoneDirector
- 2625 Conversations
- 776 Followers
-
Ruckus Indoor APs
- 1822 Conversations
- 749 Followers
-
Ruckus Outdoor APs
- 566 Conversations
- 380 Followers
-
Community & Online Support Services
- 285 Conversations
- 112 Followers
-
General Wireless Questions
- 530 Conversations
- 358 Followers