Tuesday, August 5, 2025

Aiman Al-Hadhrami Hackerone Privacy


Design Flaw in HackerOne’s Profile Visibility: A Privacy Violation (CWE-359) Under GDPR and ISO/IEC 27701




By: Aiman Al-Hadhrami

Independent Cybersecurity Researcher


❖ Introduction

In today’s digital era, privacy is not optional — it is a fundamental right, protected by global regulations like the General Data Protection Regulation (GDPR) and international standards such as ISO/IEC 27701, which emphasizes privacy by design and user control over personal data.

This post highlights a critical privacy concern on HackerOne, a well-known vulnerability disclosure platform, where users lack any control over the public visibility of their profiles and reputation scores — a design decision that may contradict their publicly stated compliance with GDPR and ISO 27701.


❖ What’s the Problem?

Currently, HackerOne user profiles are publicly visible by default, including:

  • Username
  • Profile activity
  • Reputation score

And most importantly:
There is no setting or control that allows users to hide or restrict this information.


❖ Why This is a Privacy Violation

1. Contradiction of GDPR Article 25:

Article 25 requires data protection by design and by default.” This means:

“By default, personal data should not be accessible to an indefinite number of people without the individual’s intervention.”

But on HackerOne:

  • Profile data and scores are public by default
  • No explicit consent is obtained for public exposure
  • No privacy settings are offered to limit visibility
  • Profiles are indexed by search engines without user opt-in

2. Misalignment with ISO/IEC 27701:

HackerOne publicly claims to follow this privacy management standard. However, ISO 27701 clearly emphasizes the need for user control, minimization of public exposure, and consent-driven data sharing — none of which are currently enforced on the platform.


❖ Real-World Impact on Users

Publicly exposing reputation scores — especially negative ones — without user control or contextual explanation can lead to serious consequences:

  • Professional harm and reputational damage
  • Misinterpretation of the user’s behavior as malicious or unethical
  • Loss of job opportunities, trust, or career growth
  • Emotional distress and stigmatization
  • Discouraging ethical hackers from using the platform

Reputation scores may be negatively impacted by reports closed as “Not Applicable,” even when such reports were submitted in good faith. This outcome does not imply that the report lacks validity, but may instead reflect limitations in the platform’s internal policy or scope. 

Yet outsiders often interpret such scores harshly and unfairly. It is unfair for HackerOne to publicly display a negative reputation score without giving users control to hide or explain it. Privacy is a right, not a luxury!


❖ Lack of Transparency in Reputation Penalties: A Digital Injustice

When a report is closed as "Not Applicable", the researcher is automatically penalized with -5 reputation pointswithout any public explanation.

This deduction becomes publicly visible on the researcher’s profile and can easily be misinterpreted by the general public, employers, or peers as a sign of incompetence, negligence, or even malicious behavior. In reality, many of these reports are submitted in good faith but rejected due to program scope limitations or internal platform policies, not because the report was invalid or unethical.

The bigger issue is that HackerOne does not allow researchers to disclose these specific reports to the public. This means that researchers have no ability to explain or defend why they lost points, even if they acted responsibly.

This creates a system where:

  • Reputation is damaged without context
  • Users are judged without transparency
  • Researchers are denied the ability to control their own narrative

According to Article 5 of the GDPR, personal data must be:

“Processed lawfully, fairly, and in a transparent manner...”

In this case, there is no transparency, no fairness, and no informed consent — which clearly contradicts the core principles of data protection and ethical platform design.


❖ A Privacy and Design Flaw — Not Just a Feature Request

This is not a bug in code, but a flaw in platform design — a violation of basic Privacy Engineering principles and user autonomy.

In security classification terms, this falls under:

CWE-359: Exposure of Private Information (‘Privacy Violation’)


❖ Evidence of Inconsistency:

HackerOne states publicly: 

> "We comply with ISO 27701 which provides requirements for a privacy management system within the context of an organization..." 

> "We ensure our data collection and handling practices comply with the General Data Protection Regulation (GDPR) and its rules on data protection, privacy, and transfer..."

In reality:

  • Users have no privacy or visibility controls
  • Personally identifiable information is public by default
  • Reputation scores are publicly visible without context or consent
  • Search engine indexing is enabled by default

This reveals a clear gap between HackerOne’s stated commitments and actual user experience.


❖ Proposed Solutions for Hackerone

To align with privacy standards and user expectations, I propose the following actions:

  1. Set profile visibility to private by default, in accordance with GDPR Article 25.

  2. Or Introduce Profile Visibility Settings, including: 

    • Public
    • Private 
    • Unlisted
  3. Allow users to hide or restrict visibility of reputation scores, particularly negative ones.

  4. Use a more neutral term such as "Contribution Score" or "Participation Rating" instead of "Reputation" to avoid harmful interpretations.

  5. Allow users to disclose "Not Applicable" reports voluntarily, so they can defend the context of the negative score and avoid misjudgment.

  6. Implement contextual tooltips or explanations for reputation deductions visible on public profiles (e.g., “Score impacted by a report closed as Not Applicable”).

  7. Introduce a right to appeal or explain score deductions, especially when they result from vague or non-transparent rejections.


❖ Why This Matters

This issue is not just about convenience — it’s about:

  • Protecting users from unintentional reputational harm
  • Ensuring legal compliance with privacy regulations
  • Promoting ethical platform design
  • Preserving trust in the security community

On a platform called HackerOne, where misunderstanding the term “reputation” could lead to damaging assumptions, users deserve better protection, transparency, and control over how they are publicly portrayed.


❖ Conclusion

A platform that promotes ethical hacking should not expose researchers to reputational damage simply for engaging responsibly.  A platform that promotes transparency, ethical hacking, and legal compliance should hold itself to the same standards it encourages in others. Before expecting researchers to act with integrity, it must first reflect that integrity in its own practices — by respecting user privacy, adhering to internationally recognized data protection frameworks such as GDPR Article 25, ISO/IEC 27701. Leadership in cybersecurity and privacy begins with internal accountability and a commitment to compliance by design.

Thursday, July 3, 2025

Aiman Al-hadhrami LinkedIn vulnerability

Security Report: link Preview Update Failure on LinkedIn Enabling Attacker Deception and Phishing Attacks



LinkedIn Link Preview Mismatch: A Gateway to Deception and Phishing Attacks

CVE ID: CVE-2025-56139

Affected Platform: LinkedIn Mobile Application

Affected versions: Android 4.1.1110 (Sep 2025) and earlier


Introduction

In today's digital landscape, social media platforms play a critical role in how information is shared and consumed. Link previews — the snippets showing images, titles, and descriptions when users paste URLs — have become a key feature to help users verify content before clicking. However, inconsistencies or flaws in how these previews are handled can expose users to deception, phishing, and other cyber threats.

The flaw exists in the LinkedIn mobile application, where the preview displayed for a link where the preview displayed for a link does not update correctly if a malicious URL is injected before publishing. This leads to a mismatch between the displayed preview and the actual link destination, posing significant risks of user deception and abuse.


Summary of Security Issue: Native UI Deception via Link Previews

1. User Interaction Is Expected and Routine

The attack only requires a user to click a link in a LinkedIn post — a normal, platform-native action. This clearly qualifies as likely user interaction under LinkedIn’s vulnerability disclosure policy.

2. Native UI Deception, Not External Social Engineering

This vulnerability arises from a design flaw in LinkedIn’s link preview system. When a malicious link is posted, LinkedIn automatically generates a trusted visual preview that can misrepresent the actual destination.

  • The deception is embedded within LinkedIn’s own UI.
  • No attacker-driven manipulation or off-platform trickery is involved.
  • Users are misled by what appears to be a legitimate, LinkedIn-generated preview.

3. Clearly Within In-Scope Policy Criteria

LinkedIn’s policy states:

> “Implementation and design issues that substantially impact LinkedIn members’ data or infrastructure are in scope.”

4. Reproducible with a Clear Technical Root Cause

The issue is easily reproducible and is caused by a consistent, identifiable behavior in the link preview generation process.


Platform-Specific Behavior: App vs. Web

Interestingly, this issue appears to be limited to the LinkedIn mobile application; when performing the same steps via the LinkedIn web interface in a browser, the preview either updates correctly or does not persist once the URL is injected. This suggests that the flaw may be tied to how the mobile app handles UI state and link preview caching.


Phishing via Link Preview Mismatch – LinkedIn Job-Seeker Exploitation Scenario

Example:

An attacker creates a LinkedIn post that appears to promote job opportunities from a reputable company, such as:

https://careers.microsoft.com/openings

LinkedIn instantly generates a trusted preview using Microsoft’s branding, job title, and professional imagery — creating strong visual credibility and making the post appear completely legitimate.

Before publishing, the attacker injects a malicious phishing URL into the original link:

https://2u.pw/Semzr

However, LinkedIn does not invalidate or regenerate the preview after the URL injection. As a result, the post still displays a Microsoft-branded preview, but the visible link now leads to a fake login page designed to steal credentials.

Real-World Exploitation Scenario: Job-Seeker in Distress

Imagine a recent graduate or unemployed professional desperately looking for a job.

They come across this LinkedIn post showing an official Microsoft job offer, complete with branding and job descriptions — seemingly shared by a recruiter or hiring manager.

Out of urgency and hope, they:

  • Click the link.
  • Land on a perfectly cloned login page.
  • Enter their LinkedIn credentials — or worse, corporate or email credentials used for job applications.

Result:

  • Their account is compromised.
  • Their data is harvested.
  • They may be locked out of their LinkedIn profile during critical application periods.
  • Or worse, the attacker uses the stolen account to spread more phishing through their network — amplifying the attack.

Security and Ethical Implications

This flaw allows attackers to:

  • Exploit human trust in professional networks.
  • Create targeted phishing attacks under the guise of opportunity.
  • Attackers can use LinkedIn ads to target vulnerable job seekers, increasing the success of phishing attacks.
  • Harvest credentials, personal information, or sensitive documents (CVs, passports, etc.).
  • Cause psychological harm to people already in distress due to unemployment.

The emotional and professional impact can be devastating, especially for vulnerable users. This is not just a visual mismatch — it is a trust-based attack vector that hijacks the core purpose of LinkedIn: connecting people with real opportunities.


Security Impact

  • User Deception: Users may trust the content based on a legitimate-looking preview, unaware that the actual destination is malicious.
  • Exploitation via Sponsored Ads: Attackers can use LinkedIn’s paid ads to increase the reach and credibility of malicious posts, targeting specific professional groups and making phishing attacks more effective.
  • Legal issue: Using previews based on content from trusted institutions, companies, or organizations may be exploited for phishing or deception and could lead to legal issues.
  • Phishing Facilitation: Attackers can present safe-looking previews while linking to phishing sites designed to steal login credentials, banking information, or personal data.
  • Sensitive Data Theft: Exploiting this flaw can lead users to fake portals that harvest medical records, financial credentials, personal identification data, and even corporate login information.
  • Malware & Spyware Installation: Victims may be redirected to malicious websites that automatically download spyware, keyloggers, ransomware, or other stealth malware.
  • Surveillance and Espionage: Malicious actors may use this to target executives, journalists, or government employees, injecting spyware to monitor communications or extract sensitive intelligence.


Technical Breakdown

  • LinkedIn relies on Open Graph tags to fetch preview metadata.
  • The preview is generated only when the first URL is pasted.
  • When a malicious URL is injected before publishing, LinkedIn does not re-fetch or validate the new link’s metadata.
  • This creates a visual mismatch between the displayed preview and the actual link.
  • Clicking the visible link in the post, leads to a destination completely unrelated to the image, title, or description shown


Recommendations for LinkedIn

  • Automatically invalidate and regenerate previews when a URL is injected or replaced before publishing.
  • Add UI warnings or visual cues to alert users when a link has been modified after preview generation.
  • Re-fetch metadata dynamically based on the final URL.

Responsible Disclosure:

It was disclosed through LinkedIn's bug bounty program on HackerOne on 2 July 2025 [Report ID: #3235035].


Conclusion

This vulnerability in the LinkedIn mobile application highlights a critical lapse in how link previews are managed — a seemingly minor UI behavior that can be weaponized for serious cyberattacks. By allowing outdated or misleading previews to persist even after the URL has been injected with a new destination, LinkedIn inadvertently opens the door to deception, phishing, and data theft at scale. In an era where trust and authenticity are constantly under threat, such flaws demand urgent attention. It is imperative that LinkedIn addresses this issue promptly by aligning its mobile behavior with industry standards, reinforcing preview validation mechanisms, and empowering users with clearer visibility into the links they engage with. Failure to act not only puts users at risk but also undermines trust in LinkedIn as a secure and professional platform.


Aiman Al-Hadhrami – Independent Cybersecurity Researcher 




Sunday, March 29, 2020

Vulnerabilities in Ruckus Network Products


Overview

Researcher Security Advisory Several Security Flaws in CommScope Products Discovered by Independent Researcher Aiman Al-Hadhrami, a Student at UST, Sana'a, Yemen.



Description

Multiple critical vulnerabilities have been discovered by independent security researcher Aiman Yahya Al-Hadhrami from the Republic of Yemen, a student at the University of Science and Technology, Sana'a. These vulnerabilities affect CommScope and Ruckus products.

The discovered issues include flaws in the Secure Boot mechanism and the Web GUI interface, which allow a remote attacker to bypass authentication and perform firmware upgrades using unauthorized images.


A total of 10 CVEs have been identified, with Base Scores indicating Critical Impact:

CVE-2020-22653   Base Score 9.8 CRITICAL
Full device compromise: Exploits official image signature for unauthorized firmware injection and digital signature bypass.

CVE-2020-22654   Base Score:  9.8 CRITICAL
CVE-2020-22656   Base Score:  7.5 HIGH
 Secure Boot bypass: Forces Secure Boot into failed attempts state (rfwd).

CVE-2020-22657   Base Score:  9.1 CRITICAL
Unauthorized management access: Bypasses Web GUI login authentication.

CVE-2020-22658   Base Score:   9.8 CRITICAL
Complete firmware takeover: Switches to unauthorized image as primary verified image.

CVE-2020-22659   Base Score:  7.5 HIGH
Firmware spoofing: Forces injection of unauthorized  firmware signature.

CVE-2020-22660   Base Score:  7.5 HIGH
Unauthorized operation: Bypasses Secure Boot to run backup image.

CVE-2020-22661   Base Score:  6.5 MEDIUM
Loss of trusted backup: Erases and replaces secondary backup firmware.

CVE-2020-22662   Base Score:  7.5 HIGH
Regulatory violations, network interference: Enables illegal region codes and frequencies via command injection; creates excessive SSID interfaces.


Impact/Risk

° The attacker can gain access to anywhere from thousands to millions of devices worldwide by exploiting a security vulnerability that allows them to identify these devices and their IP addresses. These devices send signals to the manufacturer, which the attacker can intercept to locate and target them. Once access is obtained, the attacker can implant modified firmware containing malicious commands to carry out cyberattacks. This firmware may also include spyware or data-stealing malware for espionage purposes. Additionally, the attacker may use these compromised devices as part of a botnet to launch DDoS attacks, overwhelming target systems with traffic.

° The vulnerabilities affected multiple devices, servers, and systems used in various sectors, including government offices, airports, hotels, companies, and hospitals around the world. If an attacker exploits these vulnerabilities in the healthcare sector, it could lead to severe consequences, including the disruption of medical devices and access to healthcare systems. Such attacks could cripple hospital network infrastructure, resulting in delays in medical procedures and critical care. In worst-case scenarios, this may lead to breaches of emergency systems, operating rooms, and intensive care units, potentially causing loss of lives.

° Illegal RF Operation: An attacker can configure the device to operate on illegal frequencies with unrestricted output power, violating air interface regulations, including FCC rules: 594280 D01, 594280 D02, and 442812 D01. Exploiting this vulnerability in sensitive locations such as airports could lead to severe consequences, including interference with radar systems and other critical communication channels, potentially causing operational disruptions and safety hazards.

° Attackers can remotely take over systems, compromising them from the lowest operating and security layers up to the highest levels, resulting in complete device compromises that victims—including even the manufacturer—cannot recover from without the attacker’s cooperation.
Moreover, neither the victims nor even the manufacturer can detect that the system is under unauthorized control, as the attacker’s code carries a signature that appears to have been legitimately issued by the company.

° Full remote compromise allows devices to be fully and remotely controlled by an attacker. Persistent backdoors can be implanted for various malicious purposes. Furthermore, future software updates can be permanently blocked by the attacker, preventing any remediation, and in the worst cases, the attacker may even brick the devices beyond repair, necessitating their complete replacement.


Responsible Disclosure


All discovered vulnerabilities were responsibly reported directly to CommScope Inc and its affiliated companies, providing them with full technical details necessary for understanding, reproducing, and fixing the issues. No exploit code or sensitive technical steps have ever been published or shared publicly, to protect critical infrastructure and prevent misuse.

Affected Products

Ruckus R310 10.5.1.0.199, Ruckus R500 10.5.1.0.199, Ruckus R600 10.5.1.0.199, Ruckus T300 10.5.1.0.199, Ruckus T301n 10.5.1.0.199, Ruckus T301s 10.5.1.0.199, SmartCell Gateway 200 (SCG200) before 3.6.2.0.795, SmartZone 100 (SZ-100)  before 3.6.2.0.795, SmartZone 300 (SZ300) before 3.6.2.0.795, Virtual SmartZone (vSZ) before 3.6.2.0.795, ZoneDirector 1100 9.10.2.0.130, ZoneDirector 1200 
10.2.1.0.218, ZoneDirector 3000 10.2.1.0.218, ZoneDirector 5000 10.0.1.0.151.

The following table outlines the vulnerable Ruckus products, the affected software versions, and the recommended mitigation actions:


vulnerable      products
Vulnerable      Releases
  Fixed Release
Patch
Release Date



ZoneDirector
10.0.x and before
Upgrade to 10.0.1.0.93
Feb 18, 2020
10.1.x
Upgrade to 10.1.2.0.277
Feb 14, 2020
10.2.x
Upgrade to 10.2.1.0.159
Feb 25, 2020
10.3.x
Upgrade to 10.3.1.0.24
Feb 25, 2020
10.4.x
Upgrade to 10.4.0.0.70
Feb 21, 2020











SmartZone
3.4.2
For Vulnerable v/SZ Release
3.4.2, upgrade to 3.4.2 Patch-4 build
3.4.2.0.245; and then customer will be to
able apply AP Patch scg-ap-3.4.2.0-
911.patch to an AP zone.




Feb 25, 2020
3.6.2
For Vulnerable v/SZ Release
3.6.2, upgrade to 3.6.2 Patch-2 build
3.6.2.0.250; and then customer will be
able to apply AP Patch scg-ap-3.6.2.0-
765.patch to an AP zone.



Feb 25, 2020
5.0, 5.1
For Vulnerable v/SZ Releases 5.0 and 5.1,
upgrade to 5.2 GA Refresh build
5.2.0.0.699; and then customer will be
able to apply AP Patch scg-ap-5.2.0.0-
5010.patch to an AP zone.



Feb 25, 2020
5.2
For Vulnerable v/SZ Release 5.2 GA
Refresh build 5.2.0.0.699 ; customer will
be able to apply AP Patch scg-ap-5.2.0.0-
5010.patch to an AP zone.


Feb 25, 2020
Cloud
5.1.1
No end-user action required
Feb 29, 2020
Unleashed C110 AP
All version
TBD
TBD
Unleashed E510 AP
All version
TBD
TBD
Unleashed H320 AP
All version
TBD
TBD
Unleashed H510 AP
All version
TBD
TBD
Unleashed M510 AP
All version
TBD
TBD
Unleashed R320 AP
All version
TBD
TBD
Unleashed R310 AP
All version
out of software support.
End of Life
Unleashed R500 AP
All version
out of software support.
End of Life
Unleashed R510  AP
All version
TBD
TBD
Unleashed R600 AP
All version
out of software support.
End of Life
Unleashed R610 AP
All version
TBD
TBD
Unleashed R710 AP
All version
TBD
TBD
Unleashed R720 AP
All version
TBD
TBD
Unleashed R750 AP
All version
TBD
TBD
Unleashed T300 AP
All version
out of software support.
End of Life
Unleashed T300e AP
All version
out of software support.
End of Life
Unleashed T301n AP
All version
out of software support.
End of Life
Unleashed T301s AP
All version
out of software support.
End of Life
Unleashed T310c AP
All version
TBD
TBD
Unleashed T310d AP
All version
TBD
TBD
Unleashed T310n AP
All version
TBD
TBD
Unleashed T310s AP
All version
TBD
TBD
Unleashed T610 AP
All version
TBD
TBD
Unleashed T710 AP
All version
TBD
TBD
Unleashed T710s AP
All version
TBD
TBD
Solo C110 AP
All version
TBD
TBD
Solo C500 AP
All version
out of software support.
End of Life
Solo H500 AP
All version
out of software support.
End of Life
Solo E510 AP
All version
TBD
TBD
Solo R300 AP
All version
out of software support.
End of Life
Solo H320 AP
All version
TBD
TBD
Solo H510 AP
All version
TBD
TBD
Solo M510 AP
All version
TBD
TBD
Solo R320 AP
All version
TBD
TBD
Solo R310 AP
All version
Upgrade to 110.0.0.0.2005
Feb 28, 2020
Solo R500 AP
All version
Upgrade to 110.0.0.0.2005
Feb 28, 2020
Solo R500e AP
All version
Upgrade to 110.0.0.0.2005
Feb 28, 2020
Solo R510  AP
All version
TBD
TBD
Solo R600 AP
All version
Upgrade to 110.0.0.0.2005
Feb 28, 2020
Solo R610 AP
All version
TBD
TBD
Solo R700 AP
All version
out of software support.
EOL
Solo R710 AP
All version
TBD
TBD
Solo R720 AP
All version
TBD
TBD
Solo R750 AP
All version
TBD
TBD
Solo T300 AP
All version
Upgrade to 110.0.0.0.2005
Feb 28, 2020
Solo T300e AP
All version
Upgrade to 110.0.0.0.2005
Feb 28, 2020
Solo T301n AP
All version
Upgrade to 110.0.0.0.2005
Feb 28, 2020
Solo T301s AP
All version
Upgrade to 110.0.0.0.2005
Feb 28, 2020
Solo T310c AP
All version
TBD
TBD
Solo T310d AP
All version
TBD
TBD
Solo T310n AP
All version
TBD
TBD
Solo T310s AP
All version
TBD
TBD
Solo T610 AP
All version
TBD
TBD
Solo T710 AP
All version
TBD
TBD
Solo T710s AP
All version
TBD
TBD
Solo T504 AP
All version
Upgrade to 110.0.0.0.2005
Feb 28, 2020
Solo P300 AP
All version
Upgrade to 110.0.0.0.2005
Feb 28, 2020
Solo ZFsc8800s AP
All version
out of software support.
End of Life
Solo ZFsc8800ac AP
All version
out of software support.
End of Life
Solo ZF7321 AP
All version
out of software support.
End of Life
Solo ZF7321u AP
All version
out of software support.
End of Life
Solo ZF7341 AP
All version
out of software support.
End of Life
Solo ZF7343 AP
All version
out of software support.
End of Life
Solo ZF7351 AP
All version
out of software support.
End of Life
Solo ZF7352 AP
All version
out of software support.
End of Life
Solo ZF7363 AP
All version
out of software support.
End of Life
Solo ZF7372 AP
All version
out of software support.
End of Life
Solo ZF7372E AP
All version
out of software support.
End of Life
Solo ZF7441 AP
All version
out of software support.
End of Life
Solo ZF7025 AP
All version
out of software support.
End of Life
Solo ZF7055 AP
All version
out of software support.
End of Life
Solo ZF7761cm AP
All version
out of software support.
End of Life
Solo ZF7762 AP
All version
out of software support.
End of Life
Solo ZF7762AC AP
All version
out of software support.
End of Life
Solo ZF7762N AP
All version
out of software support.
End of Life
Solo ZF7762S AP
All version
out of software support.
End of Life
Solo ZF7762S-AC AP
All version
out of software support.
End of Life
Solo ZF7762t AP
All version
out of software support.
End of Life
Solo ZF7781cm AP
All version
out of software support.
End of Life
Solo ZF7781cm-E AP
All version
out of software support.
End of Life
Solo
ZF7781cm-S AP
All version
out of software support.
End of Life
Solo ZF7781fn AP
All version
out of software support.
End of Life
Solo ZF7781fn-E AP
All version
out of software support.
End of Life
Solo ZF7781M AP
All version
out of software support.
End of Life
Solo ZF7781S AP
All version
out of software support.
End of Life
Solo ZF7782 AP
All version
out of software support.
End of Life
Solo ZF7782E AP
All version
out of software support.
End of Life
Solo ZF7782N AP
All version
out of software support.
End of Life
Solo ZF7782S AP
All version
out of software support.
End of Life
Solo ZF2741 AP
All version
out of software support.
End of Life
Solo ZF2741E AP
All version
out of software support.
End of Life
Solo ZF2942 AP
All version
out of software support.
End of Life
Solo ZF7982 AP
All version
out of software support.
End of Life
Solo ZF7962 AP
All version
out of software support.
End of Life
Solo ZF7942 AP
All version
out of software support.
End of Life


Solution

  • CommScope has released patches for some products and is in the process of developing and releasing software fixes for all affected products. We recommend installing these updates as soon as they become available.

  • EOL (End-of-Life) Products will not receive fix patches.

Aiman Al-Hadhrami — Independent Cybersecurity Researcher