<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic acs 1113 appliance version 4.2 ssh version 1 in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/acs-1113-appliance-version-4-2-ssh-version-1/m-p/1275001#M388470</link>
    <description>&lt;P&gt;McAffee scan of acs 1113 appliance running the 4.2 build 124 patch 12 version reports that a medium vulnerability exists because the system has SSH version 1.  Any way to specify only version 2 or turn off SSH&lt;/P&gt;</description>
    <pubDate>Sun, 10 Mar 2019 23:41:11 GMT</pubDate>
    <dc:creator>vcornett</dc:creator>
    <dc:date>2019-03-10T23:41:11Z</dc:date>
    <item>
      <title>acs 1113 appliance version 4.2 ssh version 1</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-1113-appliance-version-4-2-ssh-version-1/m-p/1275001#M388470</link>
      <description>&lt;P&gt;McAffee scan of acs 1113 appliance running the 4.2 build 124 patch 12 version reports that a medium vulnerability exists because the system has SSH version 1.  Any way to specify only version 2 or turn off SSH&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 23:41:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-1113-appliance-version-4-2-ssh-version-1/m-p/1275001#M388470</guid>
      <dc:creator>vcornett</dc:creator>
      <dc:date>2019-03-10T23:41:11Z</dc:date>
    </item>
    <item>
      <title>Re: acs 1113 appliance version 4.2 ssh version 1</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-1113-appliance-version-4-2-ssh-version-1/m-p/1275002#M388478</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The ACS is a closed system and SSH does not allow access to the Operating System; its only use is for RDBMS  synchronization.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We cannot manage the ACS via SSH like console. This port has been opened only to support "Programmatic interface for RDBMSync".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any SSH client can communicate appliance with administrator credentials and&lt;/P&gt;&lt;P&gt;execute only below commands. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Command                  Description&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;----------------------------------------------------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;?                    List commands&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;exit                 Log off&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;help                 List commands&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;csdbsync -syncnow    RDBMS synchronization&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It is not possible to take control of the appliance by exploiting SSH vulnerability.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;~JG&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do rate helpful posts&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Sep 2009 19:35:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-1113-appliance-version-4-2-ssh-version-1/m-p/1275002#M388478</guid>
      <dc:creator>Jagdeep Gambhir</dc:creator>
      <dc:date>2009-09-15T19:35:12Z</dc:date>
    </item>
    <item>
      <title>Re: acs 1113 appliance version 4.2 ssh version 1</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-1113-appliance-version-4-2-ssh-version-1/m-p/1275003#M388493</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the reply. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Assuming we do not want to do RDBMS synchronization,  can the ssh be disable or can the version be changed to version 2?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;VC&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Sep 2009 20:08:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-1113-appliance-version-4-2-ssh-version-1/m-p/1275003#M388493</guid>
      <dc:creator>vcornett</dc:creator>
      <dc:date>2009-09-15T20:08:54Z</dc:date>
    </item>
    <item>
      <title>Re: acs 1113 appliance version 4.2 ssh version 1</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-1113-appliance-version-4-2-ssh-version-1/m-p/1275004#M388500</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;HI VC,&lt;/P&gt;&lt;P&gt;Currently there is no way we can change ver to 2 and to disable SSH on the appliance. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;~JG&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do rate helpful posts&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Sep 2009 20:58:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-1113-appliance-version-4-2-ssh-version-1/m-p/1275004#M388500</guid>
      <dc:creator>Jagdeep Gambhir</dc:creator>
      <dc:date>2009-09-15T20:58:21Z</dc:date>
    </item>
    <item>
      <title>Re: acs 1113 appliance version 4.2 ssh version 1</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-1113-appliance-version-4-2-ssh-version-1/m-p/1275005#M388506</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;JG,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If this ssh version 1 vulnerability was exploited and an unauthorized user gained access to the ssh interface,  could they do harm by loading a bogus configuration into the ACS server and/or export the existing configuration which would leave the network infrastructure extremely vulnerable at that point?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Sep 2009 15:05:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-1113-appliance-version-4-2-ssh-version-1/m-p/1275005#M388506</guid>
      <dc:creator>vcornett</dc:creator>
      <dc:date>2009-09-16T15:05:24Z</dc:date>
    </item>
    <item>
      <title>Re: acs 1113 appliance version 4.2 ssh version 1</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-1113-appliance-version-4-2-ssh-version-1/m-p/1275006#M388511</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;No, it is not possible to change config using ssh vulnerability.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With SSH you will get ONLY following options,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Command Description&lt;/P&gt;&lt;P&gt;----------------------------------------------------&lt;/P&gt;&lt;P&gt;? List commands&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;exit Log off&lt;/P&gt;&lt;P&gt;help List commands&lt;/P&gt;&lt;P&gt;csdbsync -syncnow RDBMS synchronization &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So there is no way to make any config change or gain access to config using SSH. I would suggest you to ssh to appliance and explore these options. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;~JG&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do rate helpful posts&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Sep 2009 15:22:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-1113-appliance-version-4-2-ssh-version-1/m-p/1275006#M388511</guid>
      <dc:creator>Jagdeep Gambhir</dc:creator>
      <dc:date>2009-09-16T15:22:39Z</dc:date>
    </item>
    <item>
      <title>Re: acs 1113 appliance version 4.2 ssh version 1</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-1113-appliance-version-4-2-ssh-version-1/m-p/1275007#M388520</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;As explained, this doesnt really concerns the ACS as there is nothing you can do over SSH besides RDBMS config anyways.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you need CLI, you need a console on the ACS, as simple as that.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 20 Sep 2009 07:53:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-1113-appliance-version-4-2-ssh-version-1/m-p/1275007#M388520</guid>
      <dc:creator>Lucien Avramov</dc:creator>
      <dc:date>2009-09-20T07:53:38Z</dc:date>
    </item>
    <item>
      <title>Re: acs 1113 appliance version 4.2 ssh version 1</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-1113-appliance-version-4-2-ssh-version-1/m-p/1275008#M388560</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok.  Thanks for he responses.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 21 Sep 2009 12:33:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-1113-appliance-version-4-2-ssh-version-1/m-p/1275008#M388560</guid>
      <dc:creator>vcornett</dc:creator>
      <dc:date>2009-09-21T12:33:52Z</dc:date>
    </item>
    <item>
      <title>Re: acs 1113 appliance version 4.2 ssh version 1</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-1113-appliance-version-4-2-ssh-version-1/m-p/1275009#M388603</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;One of our audits lists this(ssh) as a vulnerability. I wanted to either either force SSH v2 or turn it off al together like my friend above. Your explanation on the controls or lack of controls in SSH is very helpful.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 07 Feb 2012 21:08:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-1113-appliance-version-4-2-ssh-version-1/m-p/1275009#M388603</guid>
      <dc:creator>zac ragoonath</dc:creator>
      <dc:date>2012-02-07T21:08:25Z</dc:date>
    </item>
    <item>
      <title>Re: acs 1113 appliance version 4.2 ssh version 1</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-1113-appliance-version-4-2-ssh-version-1/m-p/1275010#M388663</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Zac,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;CSCsk44379&amp;nbsp;&amp;nbsp;&amp;nbsp; ACS to Support OpenSSH 4.7 for Remote invocation of CSdbSync &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Unfortunately the bug has been Closed and no further investigation/development will be enforced in order to address the ACS SSHv1 issue. The explanation is as follows:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"The main reason for asking for upgrade of ssh library is "X11 session hijacking" attack that was identified in OpenSSH4.6.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ACS SE is Not vulnerable to this attack because ACS SE is closed box and invoking x-windows from it is not possible."&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is no way to disable SSH on the ACS SE at the moment.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If this was helpful please rate.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 08 Feb 2012 19:02:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-1113-appliance-version-4-2-ssh-version-1/m-p/1275010#M388663</guid>
      <dc:creator>camejia</dc:creator>
      <dc:date>2012-02-08T19:02:09Z</dc:date>
    </item>
  </channel>
</rss>

