Last updated on March 16, 2026 at 12:55 pm
We’re aware of the AirSnitch vulnerabilities present in wireless networking equipment from multiple vendors, including RUCKUS.
To exploit the vulnerability, an attacker needs a connection to the wireless network they’re targeting. This would require the attacker to be in range of the school’s wireless network and have valid network credentials, or to have compromised a device within the school network.
We’re currently reviewing the details of these vulnerabilities, including options to mitigate against them.
We’ll continue to monitor the situation and share any updates when we can.
If your school’s wireless network is not supported by N4L, we recommend that you speak with your IT provider about this family of vulnerabilities as multiple vendors are impacted.