<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: how to address some Vulnerabilities in cisco collaboration apps in Collaboration Applications</title>
    <link>https://community.cisco.com/t5/collaboration-applications/how-to-address-some-vulnerabilities-in-cisco-collaboration-apps/m-p/3870682#M40053</link>
    <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also I checked the procedure of changing the cipher suite but it is not applicable in my CM OS&lt;BR /&gt;1- From Cisco Unified OS Administration, choose Security &amp;gt; Cipher Management. (this is not available option)&lt;BR /&gt;please check attached&lt;/P&gt;</description>
    <pubDate>Tue, 11 Jun 2019 06:20:56 GMT</pubDate>
    <dc:creator>engreda22</dc:creator>
    <dc:date>2019-06-11T06:20:56Z</dc:date>
    <item>
      <title>how to address some Vulnerabilities in cisco collaboration apps</title>
      <link>https://community.cisco.com/t5/collaboration-applications/how-to-address-some-vulnerabilities-in-cisco-collaboration-apps/m-p/3870231#M40044</link>
      <description>&lt;P&gt;Dear All ,&lt;/P&gt;&lt;P&gt;As result of PCI , I have to address vulnerabilities related to cucm , cuc and ccx as listed below&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;1- OpenSSH &amp;lt; 7.0 Multiple Vulnerabilities :-&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;OpenSSH contains a vulnerability which can allow a remote attacker to bypass the XSECURITY restrictions when forwarding X11 connections by making use of an ineffective&lt;BR /&gt;timeout check.&lt;/P&gt;&lt;P&gt;&lt;U&gt;&lt;EM&gt;need to upgrade to ssh &amp;gt;7&lt;/EM&gt;&lt;/U&gt;&lt;BR /&gt;&lt;STRONG&gt;2- Triple DES Birthday Attack Vulnerability (Sweet32) :-&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;The Triple-DES cipher algorithm contains a vulnerability which can allow an attacker to recover secure HTTP cookies when performing a man-in-the-middle attack.&lt;/P&gt;&lt;P&gt;&lt;U&gt;&lt;EM&gt;need to&amp;nbsp;Disable Triple-DES Ciphers on the system&lt;/EM&gt;&lt;/U&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;please let me know how to fix those two vulnerabilities&lt;/P&gt;&lt;P&gt;cucm ver 12.0.1&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 10 Jun 2019 10:51:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/collaboration-applications/how-to-address-some-vulnerabilities-in-cisco-collaboration-apps/m-p/3870231#M40044</guid>
      <dc:creator>engreda22</dc:creator>
      <dc:date>2019-06-10T10:51:21Z</dc:date>
    </item>
    <item>
      <title>Re: how to address some Vulnerabilities in cisco collaboration apps</title>
      <link>https://community.cisco.com/t5/collaboration-applications/how-to-address-some-vulnerabilities-in-cisco-collaboration-apps/m-p/3870306#M40045</link>
      <description>What are the CVE identifiers for the vulnerabilities identified? Has Cisco published a PSIRT for that CVE with stated plans how they intend to address it?&lt;BR /&gt;&lt;A href="https://tools.cisco.com/security/center/publicationListing.x" target="_blank"&gt;https://tools.cisco.com/security/center/publicationListing.x&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;As for the cipher suites, you can now adjust them in CUCM 12.0 but doing so comes with a big warning that you are responsible for testing/qualifying every component in your solution supports stronger ciphers than the ones you disable. Older phones and gateways will be the most likely problematic points.&lt;BR /&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/voice_ip_comm/cucm/security/12_5_1/cucm_b_security-guide-1251/cucm_b_security-guide-1251_chapter_01.html#reference_68972012B0460E00571F79B1735FC5E9" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/voice_ip_comm/cucm/security/12_5_1/cucm_b_security-guide-1251/cucm_b_security-guide-1251_chapter_01.html#reference_68972012B0460E00571F79B1735FC5E9&lt;/A&gt;</description>
      <pubDate>Mon, 10 Jun 2019 14:01:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/collaboration-applications/how-to-address-some-vulnerabilities-in-cisco-collaboration-apps/m-p/3870306#M40045</guid>
      <dc:creator>Jonathan Schulenberg</dc:creator>
      <dc:date>2019-06-10T14:01:52Z</dc:date>
    </item>
    <item>
      <title>Re: how to address some Vulnerabilities in cisco collaboration apps</title>
      <link>https://community.cisco.com/t5/collaboration-applications/how-to-address-some-vulnerabilities-in-cisco-collaboration-apps/m-p/3870681#M40052</link>
      <description>&lt;P&gt;Thanks Jonathan for your reply.&lt;BR /&gt;The CVE of the first vulnerability is CVE-2015-5352 and recorded in non-Cisco product&lt;BR /&gt;&lt;A href="https://tools.cisco.com/security/center/viewAlert.x?alertId=41120" target="_blank"&gt;https://tools.cisco.com/security/center/viewAlert.x?alertId=41120&lt;/A&gt;&lt;BR /&gt;&lt;A href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5352" target="_blank"&gt;https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5352&lt;/A&gt;&lt;BR /&gt;However in PCI scan report it shows in cisco unity and as attached.&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jun 2019 06:20:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/collaboration-applications/how-to-address-some-vulnerabilities-in-cisco-collaboration-apps/m-p/3870681#M40052</guid>
      <dc:creator>engreda22</dc:creator>
      <dc:date>2019-06-11T06:20:21Z</dc:date>
    </item>
    <item>
      <title>Re: how to address some Vulnerabilities in cisco collaboration apps</title>
      <link>https://community.cisco.com/t5/collaboration-applications/how-to-address-some-vulnerabilities-in-cisco-collaboration-apps/m-p/3870682#M40053</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also I checked the procedure of changing the cipher suite but it is not applicable in my CM OS&lt;BR /&gt;1- From Cisco Unified OS Administration, choose Security &amp;gt; Cipher Management. (this is not available option)&lt;BR /&gt;please check attached&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jun 2019 06:20:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/collaboration-applications/how-to-address-some-vulnerabilities-in-cisco-collaboration-apps/m-p/3870682#M40053</guid>
      <dc:creator>engreda22</dc:creator>
      <dc:date>2019-06-11T06:20:56Z</dc:date>
    </item>
  </channel>
</rss>

