<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco: CVE-2024-6387  OpenSSH Server (regreSSHion) in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cisco-cve-2024-6387-openssh-server-regresshion/m-p/5143495#M590555</link>
    <description>&lt;P&gt;Hello,&lt;BR /&gt;In this bug ID, details needs to be clear like what about 3.1 Patch 5, 6, 7, 8,9 which is vulnerable or not?&lt;BR /&gt;Because, we got an alert from our internal SOC team that few of the servers running with 3.1 patch 8 is affected and few are not affected which is very confusing.&lt;BR /&gt;&lt;BR /&gt;I tried to check the openssh version on the Cisco ISE nodes but there is no details how to verify this &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Does anyone knows how to verify if the machine is affected or not by this vulnerability?&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://tools.cisco.com/bugsearch/bug/CSCwk61938" target="_blank"&gt;https://tools.cisco.com/bugsearch/bug/CSCwk61938&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Thanks,&lt;BR /&gt;Saravana&lt;/P&gt;</description>
    <pubDate>Thu, 11 Jul 2024 11:04:59 GMT</pubDate>
    <dc:creator>Saravana17</dc:creator>
    <dc:date>2024-07-11T11:04:59Z</dc:date>
    <item>
      <title>Cisco: CVE-2024-6387  OpenSSH Server (regreSSHion)</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-cve-2024-6387-openssh-server-regresshion/m-p/5142801#M590525</link>
      <description>&lt;P&gt;&lt;A href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssh-rce-2024?emailclick=CNSemail" target="_blank" rel="noopener"&gt;https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssh-rce-2024?emailclick=CNSemail&lt;/A&gt;&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;Identity Services Engine (ISE)&lt;/TD&gt;&lt;TD&gt;&lt;A href="https://tools.cisco.com/bugsearch/bug/CSCwk61938" target="_blank" rel="noopener"&gt;CSCwk61938&lt;/A&gt;&lt;/TD&gt;&lt;TD&gt;3.3 patch (Jul 2024)&lt;BR /&gt;3.2 patch (Sep 2024)&lt;BR /&gt;3.1 patch (Jan 2025)&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;None of the patches listed above is available.&lt;/P&gt;&lt;P&gt;According to this article, ISE 3.2 patch-x is vulnerable; however, in the same article, it references a bug ID&amp;nbsp;&lt;A href="https://tools.cisco.com/bugsearch/bug/CSCwk61938" target="_blank" rel="noopener"&gt;https://tools.cisco.com/bugsearch/bug/CSCwk61938&lt;/A&gt;&amp;nbsp;and stated that the issue is fixed.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thoughts?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 10 Jul 2024 11:23:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-cve-2024-6387-openssh-server-regresshion/m-p/5142801#M590525</guid>
      <dc:creator>adamscottmaster2013</dc:creator>
      <dc:date>2024-07-10T11:23:53Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco: CVE-2024-6387  OpenSSH Server (regreSSHion)</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-cve-2024-6387-openssh-server-regresshion/m-p/5142804#M590526</link>
      <description>&lt;P&gt;Looks like Cisco is updating the bugID since I read it yesterday:&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Workaround:&lt;/STRONG&gt;&lt;SPAN&gt; Cisco is working on a hotpatch for 3.1 and 3.2. Permanent fix is planned for 3.1 patch 10 and 3.2 patch 7 Fix for 3.3 is available in patch 3 - ETA July 16th &lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 10 Jul 2024 11:25:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-cve-2024-6387-openssh-server-regresshion/m-p/5142804#M590526</guid>
      <dc:creator>adamscottmaster2013</dc:creator>
      <dc:date>2024-07-10T11:25:57Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco: CVE-2024-6387  OpenSSH Server (regreSSHion)</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-cve-2024-6387-openssh-server-regresshion/m-p/5143495#M590555</link>
      <description>&lt;P&gt;Hello,&lt;BR /&gt;In this bug ID, details needs to be clear like what about 3.1 Patch 5, 6, 7, 8,9 which is vulnerable or not?&lt;BR /&gt;Because, we got an alert from our internal SOC team that few of the servers running with 3.1 patch 8 is affected and few are not affected which is very confusing.&lt;BR /&gt;&lt;BR /&gt;I tried to check the openssh version on the Cisco ISE nodes but there is no details how to verify this &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Does anyone knows how to verify if the machine is affected or not by this vulnerability?&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://tools.cisco.com/bugsearch/bug/CSCwk61938" target="_blank"&gt;https://tools.cisco.com/bugsearch/bug/CSCwk61938&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Thanks,&lt;BR /&gt;Saravana&lt;/P&gt;</description>
      <pubDate>Thu, 11 Jul 2024 11:04:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-cve-2024-6387-openssh-server-regresshion/m-p/5143495#M590555</guid>
      <dc:creator>Saravana17</dc:creator>
      <dc:date>2024-07-11T11:04:59Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco: CVE-2024-6387  OpenSSH Server (regreSSHion)</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-cve-2024-6387-openssh-server-regresshion/m-p/5146447#M590697</link>
      <description>&lt;P&gt;it is now July 18. and a fix/update has not been released yet&lt;/P&gt;</description>
      <pubDate>Thu, 18 Jul 2024 06:00:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-cve-2024-6387-openssh-server-regresshion/m-p/5146447#M590697</guid>
      <dc:creator>DCampus</dc:creator>
      <dc:date>2024-07-18T06:00:12Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco: CVE-2024-6387  OpenSSH Server (regreSSHion)</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-cve-2024-6387-openssh-server-regresshion/m-p/5148547#M590796</link>
      <description>&lt;P&gt;Unfortunately the "Fix" to ISE3.3, with Patch 3 that is now out, is NOT a fix.&amp;nbsp; &amp;nbsp; The OpenSSH version that fixes the issue is 9.8.&amp;nbsp; &amp;nbsp;Going from Patch2 to Patch3 brought me from OpenSSH v8.8 to OpenSSH v9.1, NOT the 9.8 required to fix it?&amp;nbsp; &amp;nbsp;They say this is a "workaround", but I see nothing in the CVE that mentions 9.1 being an acceptable workaround?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 22 Jul 2024 21:06:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-cve-2024-6387-openssh-server-regresshion/m-p/5148547#M590796</guid>
      <dc:creator>cnorborg</dc:creator>
      <dc:date>2024-07-22T21:06:01Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco: CVE-2024-6387  OpenSSH Server (regreSSHion)</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-cve-2024-6387-openssh-server-regresshion/m-p/5154378#M591013</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/158670"&gt;@cnorborg&lt;/a&gt;&amp;nbsp;,&lt;BR /&gt;Yes, you are right. the hotpatch upgraded Openssh version to 9.1 but not to the remediated version as 9.8 or later. Yesterday I tested with 3.1 hotpatch as well but it's same.&lt;BR /&gt;Not sure if any revised hotpatch will be released?&lt;BR /&gt;&lt;BR /&gt;Thanks,&lt;BR /&gt;Saravana&lt;/P&gt;</description>
      <pubDate>Thu, 01 Aug 2024 07:00:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-cve-2024-6387-openssh-server-regresshion/m-p/5154378#M591013</guid>
      <dc:creator>Saravana17</dc:creator>
      <dc:date>2024-08-01T07:00:51Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco: CVE-2024-6387  OpenSSH Server (regreSSHion)</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-cve-2024-6387-openssh-server-regresshion/m-p/5157227#M591128</link>
      <description>&lt;P&gt;Hi anyone updated their ise to 3.4.0? It says in the release notes that the&amp;nbsp;CSCwk61938 is resolved. See release notes:&amp;nbsp;&amp;nbsp;&lt;SPAN&gt;&lt;SPAN class=""&gt;&lt;A title="https://www.cisco.com/c/en/us/td/docs/security/ise/3-4/release_notes/b_ise_34_rn.html" href="https://www.cisco.com/c/en/us/td/docs/security/ise/3-4/release_notes/b_ise_34_RN.html" target="_blank" rel="noreferrer noopener"&gt;https://www.cisco.com/c/en/us/td/docs/security/ise/3-4/release_notes/b_ise_34_RN.html&lt;/A&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 07 Aug 2024 15:52:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-cve-2024-6387-openssh-server-regresshion/m-p/5157227#M591128</guid>
      <dc:creator>SamCruz92287</dc:creator>
      <dc:date>2024-08-07T15:52:13Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco: CVE-2024-6387  OpenSSH Server (regreSSHion)</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-cve-2024-6387-openssh-server-regresshion/m-p/5159361#M591178</link>
      <description>&lt;P&gt;Hi All,&lt;BR /&gt;It's good to know that now Cisco updated that clearly this vulnerability is fixed on the released hotpatches (Openssh V9.1).&amp;nbsp;&lt;BR /&gt;Below is updated on the bug details,&lt;BR /&gt;&lt;SPAN&gt;NOTE: Cisco uses a customized library for SSH, the fix for this vulnerability is implemented in CiscoSSH 1.13.48 (based on OpenSSH 9.1)&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Thanks,&lt;BR /&gt;Saravana&lt;/P&gt;</description>
      <pubDate>Mon, 12 Aug 2024 06:30:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-cve-2024-6387-openssh-server-regresshion/m-p/5159361#M591178</guid>
      <dc:creator>Saravana17</dc:creator>
      <dc:date>2024-08-12T06:30:29Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco: CVE-2024-6387  OpenSSH Server (regreSSHion)</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-cve-2024-6387-openssh-server-regresshion/m-p/5159619#M591187</link>
      <description>&lt;P&gt;Below?&amp;nbsp; &amp;nbsp;Did you forget to post a link or something?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 12 Aug 2024 14:17:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-cve-2024-6387-openssh-server-regresshion/m-p/5159619#M591187</guid>
      <dc:creator>cnorborg</dc:creator>
      <dc:date>2024-08-12T14:17:36Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco: CVE-2024-6387  OpenSSH Server (regreSSHion)</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-cve-2024-6387-openssh-server-regresshion/m-p/5159625#M591188</link>
      <description>&lt;P&gt;No, It's mentioned on the same Cisco bug ID link,&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://tools.cisco.com/bugsearch/bug/CSCwk61938" target="_blank"&gt;https://tools.cisco.com/bugsearch/bug/CSCwk61938&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Thanks,&lt;BR /&gt;Saravana&lt;/P&gt;</description>
      <pubDate>Mon, 12 Aug 2024 14:37:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-cve-2024-6387-openssh-server-regresshion/m-p/5159625#M591188</guid>
      <dc:creator>Saravana17</dc:creator>
      <dc:date>2024-08-12T14:37:02Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco: CVE-2024-6387  OpenSSH Server (regreSSHion)</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-cve-2024-6387-openssh-server-regresshion/m-p/5164560#M591345</link>
      <description>&lt;P&gt;I have done this as well.&amp;nbsp; ISE 3.3 patch 3 is NOT reporting as compliant and it is NOT fixing this vulnerability.&lt;/P&gt;</description>
      <pubDate>Thu, 22 Aug 2024 16:00:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-cve-2024-6387-openssh-server-regresshion/m-p/5164560#M591345</guid>
      <dc:creator>Chris_Schubert</dc:creator>
      <dc:date>2024-08-22T16:00:01Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco: CVE-2024-6387  OpenSSH Server (regreSSHion)</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-cve-2024-6387-openssh-server-regresshion/m-p/5165711#M591377</link>
      <description>&lt;P&gt;Hi,&lt;BR /&gt;How did you verify that if this is not compliant?&lt;BR /&gt;&lt;BR /&gt;As per cisco below update,&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;NOTE: Cisco uses a customized library for SSH, the fix for this vulnerability is implemented in CiscoSSH 1.13.48 (based on OpenSSH 9.1)&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://tools.cisco.com/bugsearch/bug/CSCwk61938" target="_blank" rel="nofollow noopener noreferrer"&gt;https://tools.cisco.com/bugsearch/bug/CSCwk61938&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Thanks,&lt;BR /&gt;Saravana&lt;/P&gt;</description>
      <pubDate>Sun, 25 Aug 2024 20:46:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-cve-2024-6387-openssh-server-regresshion/m-p/5165711#M591377</guid>
      <dc:creator>Saravana17</dc:creator>
      <dc:date>2024-08-25T20:46:45Z</dc:date>
    </item>
  </channel>
</rss>

