![]() ![]() Other measures to protect your devices from falling prey to botnets are: To protect your devices against the AndoryuBot botnet which seems to thrive on this vulnerability, you should install the available patches and replace the legacy devices that have reached EoL. This protocol is often used because it allows traffic to bypass Internet filtering to access content which would otherwise be blocked, but it can also be used to circumvent blocklists and firewall rules. SOCKS is an Internet protocol that exchanges network packets between a client and server through a proxy server. ![]() ![]() To avoid detection and to bypass firewalls, the botnet uses the SOCKS proxying protocol. Infected devices are used to propagate the botnet malware to other devices and are used in DDoS attacks. ![]() One malware operator that has been found to exploit vulnerable Ruckus devices is the relatively new botnet, AndoryuBot. Users of supported devices can find download links and install instructions by following the links behind their specific product. Several of these devices have reached end-of-life (EoL) which means they may not get patched against this vulnerability. The Ruckus security bulletin about the vulnerability, issued on Februand edited on May 11, 2023, displays a long list of affected devices. This vulnerability reportedly impacts Ruckus ZoneDirector, SmartZone, and Solo Aps with Ruckus Wireless Admin panels version 10.4 and older. If the component is enabled on the access point, an attacker can perform cross-site request forgery (CSRF) or remote code execution (RCE). The Ruckus vulnerability is listed under CVE-2023-25717, which indicates that Ruckus Wireless Access Point software contains a vulnerability in its web services component. The Common Vulnerabilities and Exposures (CVE) database lists publicly disclosed computer security flaws. This means that Federal Civilian Executive Branch (FCEB) agencies need to remediate these vulnerabilities by June 2, 2023. Along with six older vulnerabilities, the Cybersecurity and Infrastructure Agency (CISA) has added a vulnerability in multiple Ruckus wireless products to the Known Exploited Vulnerabilities Catalog. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |