===================================================================
Version 6.0.1 (XM/XW) - Service Release (March 17, 2017)
-------------------------------------------------------
Supported products
* Bullet M2/M5/Titanium
* Rocket M2/M2 Titanium/M3/M365/M900/M5/M5 GPS/M5 Titanium/M6
* NanoStation M2/M3/M365/M5/M6
* NanoStation Loco M2/M900/M5
* NanoBridge M2/M3/M365/M900/M5
* AirGrid M2/M5/HP/HP New
* PowerBridge M3/M365/M5/M10
* PicoStation M2
* AirRouter/HP
* PowerAP N
* NanoBeam M2/M5
* AirGrid M5 HP
* NanoStation M5
* NanoStation M5 Loco
* Rocket M5/Titanium
New:
- New: Update tcpdump to v4.9.0
Regulatory updates:
- Revised UNII Rules activation for IC/Canada ( https://www.ubnt.com/iccoderequest/ )
- Updated New Zealand allowed frequencies for 5GHz
- Removed DFS enable/disable option for Australia
airOS security improvements:
- Command injection in Ping test tool
- OpenSSL update to to v1.0.2j
- Remove unused WMM related code
- Other security fixes and improvements
Fixes:
- Fix: airOS stability improvements
- Fix: XM 2.4GHz clients are disconnecting in airMAX AC Mixed mode
- Fix: Station fails re-authentication with AP when the same SSID is used for other APs
- Fix: Applying configuration changes fails after changing SSID and Security from WPA2 to OPEN
❗️Toto je původní verze internetového fóra ISPforum.cz do února 2020 bez možnosti registrace nových uživatelů. Aktivní verzi fóra naleznete na adrese https://telekomunikace.cz
FW 6.0.1
-
- Příspěvky: 78
- Registrován: 13 years ago
Ve verzi 6.0 se mi kousali spoje s WDS, tak doufám, že už je to opravené...
0 x
jak se pozna jestli je zarizeni urcene pro firmware se 400mhz CPU jak to tedkonc rozdelili nebo ne? v popisku ktery zarizeni to podporuji jsou v podstate stejny zarizeni u obou verzi
0 x
- midnight_man
- Příspěvky: 3680
- Registrován: 13 years ago
-
- Příspěvky: 108
- Registrován: 11 years ago
midnight_man píše:preco riesis CPU? FW je podla HW verzie... XM,XW, XC, WA...a pod...
resim CPU protoze XM verze je rozdelena na dve a to XM 6.0.1 a 6.0.1 CPU 400 a proto jsem chtel vedet ktery mam kam instalovat
0 x
- midnight_man
- Příspěvky: 3680
- Registrován: 13 years ago
2.4GHz and 900MHz products has performance issues when CPU is operating at 400MHz speed. We are investigating further how to eliminate both issues (Verizon and M2/M900 performance in one firmware).
nepodstatne pre M5tky...
nepodstatne pre M5tky...
0 x
I M P O R T A N T
Addressing Security Concerns
We take network security very seriously and have fixed the authenticated command injection vulnerability for all affected products: airMAX, airGateway, TOUGHSwitch, and airFiber; please upgrade the firmware for your devices. UniFi, EdgeMAX, and AmpliFi products are not affected.
While we acknowledge that all vulnerabilities are serious, we believe this issue rates fairly low in terms of threat severity, because it requires being authenticated to the management web interface, or tricking an authenticated administrator into opening a targeted, crafted URL in the browser where they are logged in to the affected device. Ubiquiti strongly backs our security measures:
Dedicated Security Director focused 100% on Ubiquiti software vulnerabilities and supported by a strong group of engineers
Participation in third-party vulnerability assessment programs such as HackerOne, where we have given out substantial rewards
Significant investment retaining third-party external security audit company to review our software solutions frequently
We’re currently addressing the php2 code concern, which will be eliminated from applicable code bases within the next few weeks.
v6.0.1 or later
v8.0.1 or later
v1.3.4 or later
v1.1.8 or later
v3.2.2 or later
v3.2.2 or later
v3.4.1 or later
v3.6.1 or later
Addressing Security Concerns
We take network security very seriously and have fixed the authenticated command injection vulnerability for all affected products: airMAX, airGateway, TOUGHSwitch, and airFiber; please upgrade the firmware for your devices. UniFi, EdgeMAX, and AmpliFi products are not affected.
While we acknowledge that all vulnerabilities are serious, we believe this issue rates fairly low in terms of threat severity, because it requires being authenticated to the management web interface, or tricking an authenticated administrator into opening a targeted, crafted URL in the browser where they are logged in to the affected device. Ubiquiti strongly backs our security measures:
Dedicated Security Director focused 100% on Ubiquiti software vulnerabilities and supported by a strong group of engineers
Participation in third-party vulnerability assessment programs such as HackerOne, where we have given out substantial rewards
Significant investment retaining third-party external security audit company to review our software solutions frequently
We’re currently addressing the php2 code concern, which will be eliminated from applicable code bases within the next few weeks.
v6.0.1 or later
v8.0.1 or later
v1.3.4 or later
v1.1.8 or later
v3.2.2 or later
v3.2.2 or later
v3.4.1 or later
v3.6.1 or later
0 x