<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Fixing Struts2 CVE-2017-5638 in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/fixing-struts2-cve-2017-5638/m-p/3190295#M552570</link>
    <description>I believe the patch is already integrated with 2.1 Patch 4 and above. So if you are using 2.1 patch 5, you do not need to install the patch separately.</description>
    <pubDate>Wed, 27 Sep 2017 13:07:29 GMT</pubDate>
    <dc:creator>Rahul Govindan</dc:creator>
    <dc:date>2017-09-27T13:07:29Z</dc:date>
    <item>
      <title>Fixing Struts2 CVE-2017-5638</title>
      <link>https://community.cisco.com/t5/network-access-control/fixing-struts2-cve-2017-5638/m-p/3190147#M552569</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;According to relese notes the struts fix apply to ISE 2.1 patch 3&lt;/P&gt;&lt;P&gt;How is it with ISE 2.1 patch 5 should we appy the struts fix also to patch 5 ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;From release notes&lt;/P&gt;&lt;P&gt;Download the latest patch available from CCO and install before installing these bundles.&lt;BR /&gt;please note that this patch should be installed only on top of latest patch (Not hotfixes).&lt;/P&gt;&lt;P&gt;2.0 Patch 4&lt;BR /&gt;2.0.1 Patch 3&lt;BR /&gt;2.1 Patch 3&lt;BR /&gt;2.2 ( No patches )&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Kind regards&lt;/P&gt;&lt;P&gt;Lars-Ove&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 18:34:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/fixing-struts2-cve-2017-5638/m-p/3190147#M552569</guid>
      <dc:creator>llinddahl</dc:creator>
      <dc:date>2020-02-21T18:34:59Z</dc:date>
    </item>
    <item>
      <title>Re: Fixing Struts2 CVE-2017-5638</title>
      <link>https://community.cisco.com/t5/network-access-control/fixing-struts2-cve-2017-5638/m-p/3190295#M552570</link>
      <description>I believe the patch is already integrated with 2.1 Patch 4 and above. So if you are using 2.1 patch 5, you do not need to install the patch separately.</description>
      <pubDate>Wed, 27 Sep 2017 13:07:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/fixing-struts2-cve-2017-5638/m-p/3190295#M552570</guid>
      <dc:creator>Rahul Govindan</dc:creator>
      <dc:date>2017-09-27T13:07:29Z</dc:date>
    </item>
    <item>
      <title>Re: Fixing Struts2 CVE-2017-5638</title>
      <link>https://community.cisco.com/t5/network-access-control/fixing-struts2-cve-2017-5638/m-p/3190324#M552571</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Confirming what Rahul said - ISE 2.1 Patch 4 resolved the struts vulnerability so any 2.1 system with that patch (or later) does not require the Struts hotfix. (ISE patches are cumulative.)&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 27 Sep 2017 13:39:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/fixing-struts2-cve-2017-5638/m-p/3190324#M552571</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-09-27T13:39:45Z</dc:date>
    </item>
  </channel>
</rss>

