<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: CSCvf36258 - Cisco IOS and IOS XE Software HTTP Client Information Disclosure Vulnerability in Cisco Bug Discussions</title>
    <link>https://community.cisco.com/t5/cisco-bug-discussions/cscvf36258-cisco-ios-and-ios-xe-software-http-client-information/m-p/4127641#M11220</link>
    <description>&lt;P&gt;I've found advisory notices to be contradictory.&lt;/P&gt;&lt;P&gt;Cisco will list one OS version affected and 70 versions patched. ?WT?I think a "WORKAROUND" is a trick to avoid the bug WHILE STILL USING THAT FEATURE.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For instance security advisories about corrupted BGP updates from routing partners does not list "Do not use BGP" as a workaround.&amp;nbsp; But obviously it is. If your not using it, then updates aren't being accepted or acted on. But it will not be listed as a workround.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I did open a TAC case and they confirmed that deactivating the servers would eliminate the concern.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The title says it is HTTP, but I don't recall if HTTPS is affected.&amp;nbsp; If so, both servers would need to be disabled. We don't run either server so it was a non-issue for us.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;no http server&lt;/P&gt;&lt;P&gt;no https server&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 29 Jul 2020 19:59:43 GMT</pubDate>
    <dc:creator>RoyalEF3153</dc:creator>
    <dc:date>2020-07-29T19:59:43Z</dc:date>
    <item>
      <title>CSCvf36258 - Cisco IOS and IOS XE Software HTTP Client Information Disclosure Vulnerability</title>
      <link>https://community.cisco.com/t5/cisco-bug-discussions/cscvf36258-cisco-ios-and-ios-xe-software-http-client-information/m-p/3990286#M10191</link>
      <description>&lt;P&gt;Good morning&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Advisory says: "A vulnerability in the HTTP client feature of Cisco IOS and IOS XE Software" and " there's no workaround"&lt;BR /&gt;&lt;BR /&gt;Please, how can I check in device (IOS or IOS-XE) if this " HTTP client feature" is active or used?&lt;BR /&gt;&lt;BR /&gt;Is it the same as " ip http server" in show run ?&lt;BR /&gt;&lt;BR /&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;christian&lt;/P&gt;</description>
      <pubDate>Wed, 27 Nov 2019 18:18:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cisco-bug-discussions/cscvf36258-cisco-ios-and-ios-xe-software-http-client-information/m-p/3990286#M10191</guid>
      <dc:creator>Christian Jorge</dc:creator>
      <dc:date>2019-11-27T18:18:29Z</dc:date>
    </item>
    <item>
      <title>Re: CSCvf36258 - Cisco IOS and IOS XE Software HTTP Client Information Disclosure Vulnerability</title>
      <link>https://community.cisco.com/t5/cisco-bug-discussions/cscvf36258-cisco-ios-and-ios-xe-software-http-client-information/m-p/3991635#M10204</link>
      <description>&lt;P&gt;Read&amp;nbsp;&lt;A href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190925-http-client" target="_self"&gt;Cisco IOS and IOS XE Software HTTP Client Information Disclosure Vulnerability&lt;/A&gt; and scroll down to the bottom of the page where one can check if the IOS/IOS-XE is affected by this bug (or not).&lt;/P&gt;</description>
      <pubDate>Sun, 01 Dec 2019 08:43:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cisco-bug-discussions/cscvf36258-cisco-ios-and-ios-xe-software-http-client-information/m-p/3991635#M10204</guid>
      <dc:creator>Leo Laohoo</dc:creator>
      <dc:date>2019-12-01T08:43:38Z</dc:date>
    </item>
    <item>
      <title>Re: CSCvf36258 - Cisco IOS and IOS XE Software HTTP Client Information Disclosure Vulnerability</title>
      <link>https://community.cisco.com/t5/cisco-bug-discussions/cscvf36258-cisco-ios-and-ios-xe-software-http-client-information/m-p/4012917#M10414</link>
      <description>&lt;P&gt;Sorry, but the question is not how to verify whether a software version is potentially vulnerable or not.&lt;BR /&gt;Of course, you can confirm it by IOS Checker and I think it's kind a first step to confirm your device is affected.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The question is how to verify in configuration whether my device is vulnerable or not.&lt;/P&gt;&lt;P&gt;Sometimes Cisco informs it in its Advisory.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This case, only having http server, or similar, enable on a device with affected IOS is enough?&lt;BR /&gt;Is there any other piece of configuration to be checked?&lt;/P&gt;</description>
      <pubDate>Thu, 16 Jan 2020 19:27:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cisco-bug-discussions/cscvf36258-cisco-ios-and-ios-xe-software-http-client-information/m-p/4012917#M10414</guid>
      <dc:creator>Christian Jorge</dc:creator>
      <dc:date>2020-01-16T19:27:57Z</dc:date>
    </item>
    <item>
      <title>Re: CSCvf36258 - Cisco IOS and IOS XE Software HTTP Client Information Disclosure Vulnerability</title>
      <link>https://community.cisco.com/t5/cisco-bug-discussions/cscvf36258-cisco-ios-and-ios-xe-software-http-client-information/m-p/4094378#M10974</link>
      <description>&lt;P&gt;I have the same exact question.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We don't enable http or https on any of our switches.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;IT would be my assumption that this can not affect our configuration?&amp;nbsp; Because otherwise we have to update 95% of the switches in the company.&lt;/P&gt;</description>
      <pubDate>Fri, 29 May 2020 13:45:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cisco-bug-discussions/cscvf36258-cisco-ios-and-ios-xe-software-http-client-information/m-p/4094378#M10974</guid>
      <dc:creator>RoyalEF3153</dc:creator>
      <dc:date>2020-05-29T13:45:01Z</dc:date>
    </item>
    <item>
      <title>Re: CSCvf36258 - Cisco IOS and IOS XE Software HTTP Client Information Disclosure Vulnerability</title>
      <link>https://community.cisco.com/t5/cisco-bug-discussions/cscvf36258-cisco-ios-and-ios-xe-software-http-client-information/m-p/4127502#M11219</link>
      <description>&lt;P&gt;I have the same issue, a customer is stating they are not vulnerable due to "no ip http server" but imo that is not good enough &amp;amp; they should have to either prove that http client is disabled OR upgrade.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1. Is it possible to disable http client? (haven't seen anything about it online &amp;amp; I don't have a testing environment and I don't want to waste the customer's time asking them to do something impossible)&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; a. If that is the case, then shouldn't the Advisory state a workaround is available?&amp;nbsp;&lt;/P&gt;&lt;P&gt;2. Is "no ip http server" enough to effectively render devices invulnerable to this advisory?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 29 Jul 2020 16:24:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cisco-bug-discussions/cscvf36258-cisco-ios-and-ios-xe-software-http-client-information/m-p/4127502#M11219</guid>
      <dc:creator>routers_and_switches_oh_my</dc:creator>
      <dc:date>2020-07-29T16:24:52Z</dc:date>
    </item>
    <item>
      <title>Re: CSCvf36258 - Cisco IOS and IOS XE Software HTTP Client Information Disclosure Vulnerability</title>
      <link>https://community.cisco.com/t5/cisco-bug-discussions/cscvf36258-cisco-ios-and-ios-xe-software-http-client-information/m-p/4127641#M11220</link>
      <description>&lt;P&gt;I've found advisory notices to be contradictory.&lt;/P&gt;&lt;P&gt;Cisco will list one OS version affected and 70 versions patched. ?WT?I think a "WORKAROUND" is a trick to avoid the bug WHILE STILL USING THAT FEATURE.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For instance security advisories about corrupted BGP updates from routing partners does not list "Do not use BGP" as a workaround.&amp;nbsp; But obviously it is. If your not using it, then updates aren't being accepted or acted on. But it will not be listed as a workround.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I did open a TAC case and they confirmed that deactivating the servers would eliminate the concern.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The title says it is HTTP, but I don't recall if HTTPS is affected.&amp;nbsp; If so, both servers would need to be disabled. We don't run either server so it was a non-issue for us.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;no http server&lt;/P&gt;&lt;P&gt;no https server&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 29 Jul 2020 19:59:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cisco-bug-discussions/cscvf36258-cisco-ios-and-ios-xe-software-http-client-information/m-p/4127641#M11220</guid>
      <dc:creator>RoyalEF3153</dc:creator>
      <dc:date>2020-07-29T19:59:43Z</dc:date>
    </item>
    <item>
      <title>Re: CSCvf36258 - Cisco IOS and IOS XE Software HTTP Client Information Disclosure Vulnerability</title>
      <link>https://community.cisco.com/t5/cisco-bug-discussions/cscvf36258-cisco-ios-and-ios-xe-software-http-client-information/m-p/4295954#M11967</link>
      <description>&lt;P&gt;With regard to the information in the advisory, I'd stand firm with disabling only the HTTP server, not the HTTPS.&lt;/P&gt;</description>
      <pubDate>Tue, 23 Feb 2021 11:44:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cisco-bug-discussions/cscvf36258-cisco-ios-and-ios-xe-software-http-client-information/m-p/4295954#M11967</guid>
      <dc:creator>MartinKajan</dc:creator>
      <dc:date>2021-02-23T11:44:35Z</dc:date>
    </item>
  </channel>
</rss>

