<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: OpenSSH vulnerability in Cisco ISE in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/openssh-vulnerability-in-cisco-ise/m-p/5116042#M589622</link>
    <description>&lt;P&gt;I went through the TAC process for this and I would like to save the next person some time. The mitigation configs from the bug report listed as the solution do stop OpenSSH connections but don't stop the scanner from seeing it as a vulnerability. Hope this helps!&lt;/P&gt;</description>
    <pubDate>Fri, 24 May 2024 20:24:34 GMT</pubDate>
    <dc:creator>Kaleb Kwiatkowski</dc:creator>
    <dc:date>2024-05-24T20:24:34Z</dc:date>
    <item>
      <title>OpenSSH vulnerability in Cisco ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/openssh-vulnerability-in-cisco-ise/m-p/5097878#M589363</link>
      <description>&lt;P&gt;Hello! A scan were made to my Cisco ISE and shown a vulnerability in OpenSSH, the recommendations were to upgrade OpenSSH to version &amp;gt;9.6, do anyone knows if there is a CVE documented to this vuln? Or there is any documentation that explain to which version upgrade my ISE?&lt;/P&gt;
&lt;P&gt;ISE Version: 3.0.0.458&lt;BR /&gt;Installed Patches: 5&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 09 May 2024 18:35:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/openssh-vulnerability-in-cisco-ise/m-p/5097878#M589363</guid>
      <dc:creator>Arthur Martez</dc:creator>
      <dc:date>2024-05-09T18:35:00Z</dc:date>
    </item>
    <item>
      <title>Re: OpenSSH vulnerability in Cisco ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/openssh-vulnerability-in-cisco-ise/m-p/5098234#M589365</link>
      <description>&lt;P&gt;CVE should be universal, so if you know the CVE you should be able to find it on cisco.com and see if it is fixed and what version/patch. Without that info there isn't much we can instruct you on. Whatever you use to scan should give you the CVE.&lt;/P&gt;</description>
      <pubDate>Thu, 09 May 2024 19:37:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/openssh-vulnerability-in-cisco-ise/m-p/5098234#M589365</guid>
      <dc:creator>Dustin Anderson</dc:creator>
      <dc:date>2024-05-09T19:37:16Z</dc:date>
    </item>
    <item>
      <title>Re: OpenSSH vulnerability in Cisco ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/openssh-vulnerability-in-cisco-ise/m-p/5098365#M589366</link>
      <description>&lt;P&gt;Yeah, you were right, aparentelly is the&amp;nbsp;CVE-2023-48795, but I only found solved bugs for other Cisco Devices, not for ISE, do you know if theres an announced patch for that CVE and for ISE?&lt;/P&gt;</description>
      <pubDate>Thu, 09 May 2024 19:54:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/openssh-vulnerability-in-cisco-ise/m-p/5098365#M589366</guid>
      <dc:creator>Arthur Martez</dc:creator>
      <dc:date>2024-05-09T19:54:45Z</dc:date>
    </item>
    <item>
      <title>Re: OpenSSH vulnerability in Cisco ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/openssh-vulnerability-in-cisco-ise/m-p/5098777#M589375</link>
      <description>&lt;P&gt;&lt;A href="https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwi57761" target="_blank"&gt;https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwi57761&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 09 May 2024 23:16:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/openssh-vulnerability-in-cisco-ise/m-p/5098777#M589375</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2024-05-09T23:16:54Z</dc:date>
    </item>
    <item>
      <title>Re: OpenSSH vulnerability in Cisco ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/openssh-vulnerability-in-cisco-ise/m-p/5116042#M589622</link>
      <description>&lt;P&gt;I went through the TAC process for this and I would like to save the next person some time. The mitigation configs from the bug report listed as the solution do stop OpenSSH connections but don't stop the scanner from seeing it as a vulnerability. Hope this helps!&lt;/P&gt;</description>
      <pubDate>Fri, 24 May 2024 20:24:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/openssh-vulnerability-in-cisco-ise/m-p/5116042#M589622</guid>
      <dc:creator>Kaleb Kwiatkowski</dc:creator>
      <dc:date>2024-05-24T20:24:34Z</dc:date>
    </item>
    <item>
      <title>Re: OpenSSH vulnerability in Cisco ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/openssh-vulnerability-in-cisco-ise/m-p/5117794#M589641</link>
      <description>&lt;P&gt;Thank you! It is really helpful&lt;/P&gt;</description>
      <pubDate>Mon, 27 May 2024 16:23:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/openssh-vulnerability-in-cisco-ise/m-p/5117794#M589641</guid>
      <dc:creator>Arthur Martez</dc:creator>
      <dc:date>2024-05-27T16:23:37Z</dc:date>
    </item>
  </channel>
</rss>

