Virtual SmartZone - (vSZ)
Product Detail
Note: The Virtual SmartCell Gateway (vSCG) has a new name: Virtual SmartZone (vSZ). Same product, new name.
The Ruckus Virtual SmartZone (vSZ) is an NFV-based and cloud-ready WLAN controller for service providers and enterprises ready to elevate their WLAN deployment to the next level of flexibility, resiliency, andscale. vSZ operates in two modes: Essentials and High-Capacity.
Enterprises will find that the Essentials mode (vSZ-E) delivers world-beating Wi-Fi performance in an incredibly easy to manage and cost-effective package that’s friendly to both virtualized and/or distributed environments.
Managed Service Providers deploying the High-Capacity mode (vSZ-H) in their data center will experience a scalable carrier-class Wi-Fi rollout brimming with unique service provider features ready to back up their service level agreements.
- Model Name:
- vSZ
- Product Family:
- Virtual SmartZone (vSZ)
- Recommended Software:
- Stability Release:
- Base release:
- Technology Release:
- Base release:
Please Wait...
Please Wait...
ID | Title | Version | Release Date | Edit Date |
---|---|---|---|---|
20180427 | SmartZone Security Best Practices for Network Security | 1 | April 28, 2018 | April 28, 2018 |
20190603 | Ruckus SmartZone Privilege Escalation Vulnerability (CVE-2019-11630) | 1.2 | June 03, 2019 | August 12, 2019 |
20190815 | TCP SACK Panic - Kernel Vulnerability (CVE-2019-11477, CVE-2019-11478, CVE-2019-11479) | 1.2 | August 15, 2019 | January 08, 2020 |
20180601 | Vulnerabilities in Openssl (CVE-201703738, CVE-2018-0733, CVE-2018-0739) | 1.0 | June 01, 2018 | June 01, 2018 |
20180319 | Security vulnerabilities addressed by NTP (CVE-2016-1549, CVE-2018-7182, CVE-2018-7170, CVE-2018-7184, CVE-2018-7185, CVE-2018-7183) | 1.0 | March 19, 2018 | March 19, 2018 |
20180203 | Java JMX and RMI security vulnerabilities (CVE-2017-15708, CVE-2016-8735) | 1 | February 13, 2018 | February 13, 2018 |
20180815 | Linux Kernel TCP Reassembly Algorithm Remote DOS Vulnerability (CVE-2018-5390) | 1.3 | August 15, 2018 | January 16, 2019 |
20180516 | Ruckus SmartZone Sensitive Information Disclosure Vulnerability | 1.1 | May 16, 2018 | May 22, 2018 |
20200302 | Ruckus AP Image Upgrade Vulnerability | 1.0 | March 02, 2020 | March 02, 2020 |
20210114 | Ruckus AP LLDP Vulnerability (CVE-2015-8011, CVE-2015-8012) | 1.0 | January 14, 2021 | January 14, 2021 |
20210409 | RUCKUS SmartZone Information Disclosure Vulnerability | 1.0 | April 09, 2021 | April 09, 2021 |
20210511 | RUCKUS AP Aggregation And Fragmentation Attacks Vulnerability (aka “FragAttacks”) | 1.1 | May 11, 2021 | October 15, 2021 |
20210719 | RUCKUS SmartZone Reflective Amplification Attack Vulnerability | 1.0 | July 19, 2021 | July 19, 2021 |
20211213 | CVE-2021-44228: Apache Log4j Vulnerability | 1.3 | December 13, 2021 | December 17, 2021 |
20230404 | CVE-2022-47522: Framing Frames: Bypassing Wi-Fi Encryption by Manipulating Transmit Queues | 1.0 | April 04, 2023 | April 05, 2023 |
20231128 | CVE-2023-49225: RUCKUS AP Stored Cross-Site Scripting Vulnerability | 1.0 | November 29, 2023 | November 29, 2023 |
ID | Title | Version | Release Date | Edit Date |
TSB-2024-002 | TSB-2024-002_RUCKUS-License-Server-Host | 3.3 | 2024-05-08 | 2024-05-14 |
TSB-2024-002 | TSB-2024-002_RUCKUS-License-Server-Host | 3.3 | 2024-05-08 | 2024-05-14 |
TSB-2024-007 | TSB 2024-007 - Upgrade Restriction from SmartZone 6.1.2 Patch-3 to SZ 7.0.0 or 7.1.0 | 1.2 | 2024-11-21 | 2025-01-07 |
Content Source Legend
