<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco ISE 3.4.0.608 Vulnerability in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cisco-ise-3-4-0-608-vulnerability/m-p/5283807#M596038</link>
    <description>&lt;P&gt;What patch level of 3.4? Note that Cisco uses a customized version of OpenSSH. These are most likely false positives.&lt;/P&gt;</description>
    <pubDate>Tue, 22 Apr 2025 13:45:31 GMT</pubDate>
    <dc:creator>ahollifield</dc:creator>
    <dc:date>2025-04-22T13:45:31Z</dc:date>
    <item>
      <title>Cisco ISE 3.4.0.608 Vulnerability</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-3-4-0-608-vulnerability/m-p/5283449#M596026</link>
      <description>&lt;P&gt;Greetings&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;My vulnerability Scan show that my ISE server have 2 vulnerability in version 3.4.0.608&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV&gt;&lt;FONT face="times new roman,times"&gt;PKIX-SSH Prefix Truncation Attacks in SSH Specification (Terrapin Attack)&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="times new roman,times"&gt;"Update to version 14.4 or later.&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="times new roman,times"&gt;&amp;nbsp; Notes:&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="times new roman,times"&gt;&amp;nbsp; - Client and Server implementations need to run a fixed version to mitigate this flaw&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="times new roman,times"&gt;&amp;nbsp; - Please create an override for this result if an adequate mitigation (e.g. in form of disabling&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="times new roman,times"&gt;&amp;nbsp; the affected ciphers) has been applied and the risk is accepted that the mitigation won't be&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="times new roman,times"&gt;&amp;nbsp; reverted again in the future"&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="times new roman,times"&gt;CVE-2023-48795&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="times new roman,times"&gt;--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="times new roman,times"&gt;SSL/TLS: Renegotiation DoS Vulnerability (CVE-2011-1473, CVE-2011-5094)&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="times new roman,times"&gt;"Users should contact their vendors for specific patch information.&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="times new roman,times"&gt;&amp;nbsp; A general solution is to remove/disable renegotiation capabilities altogether from/in the affected&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="times new roman,times"&gt;&amp;nbsp; SSL/TLS service."&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="times new roman,times"&gt;CVE-2011-1473,CVE-2011-5094&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="times new roman,times"&gt;"The flaw might make it easier for remote attackers to cause a&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="times new roman,times"&gt;&amp;nbsp; DoS (CPU consumption) by performing many renegotiations within a single connection."&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Its there any fix or patch upgrade to fix this? I mostly use the ISE for Device Administration (TACACS)&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Thanks in advance&lt;BR /&gt;&lt;BR /&gt;&lt;/FONT&gt;&lt;/DIV&gt;</description>
      <pubDate>Mon, 21 Apr 2025 16:56:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-3-4-0-608-vulnerability/m-p/5283449#M596026</guid>
      <dc:creator>jm-barreto</dc:creator>
      <dc:date>2025-04-21T16:56:20Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE 3.4.0.608 Vulnerability</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-3-4-0-608-vulnerability/m-p/5283807#M596038</link>
      <description>&lt;P&gt;What patch level of 3.4? Note that Cisco uses a customized version of OpenSSH. These are most likely false positives.&lt;/P&gt;</description>
      <pubDate>Tue, 22 Apr 2025 13:45:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-3-4-0-608-vulnerability/m-p/5283807#M596038</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2025-04-22T13:45:31Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE 3.4.0.608 Vulnerability</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-3-4-0-608-vulnerability/m-p/5284135#M596050</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1434444"&gt;@jm-barreto&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;please take a look at: &lt;A href="https://sec.cloudapps.cisco.com/security/center/publicationListing.x?product=Cisco&amp;amp;keyword=identity%20services%20engine&amp;amp;sort=-day_sir&amp;amp;limit=100#~Vulnerabilities" target="_blank" rel="noopener"&gt;Cisco Security Advisories - Identity Services Engine&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Note: I didn't find the&amp;nbsp;CVE-2011-1473, CVE-2011-5094 or CVE-2023-48795.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hope this helps !!!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 23 Apr 2025 05:48:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-3-4-0-608-vulnerability/m-p/5284135#M596050</guid>
      <dc:creator>Marcelo Morais</dc:creator>
      <dc:date>2025-04-23T05:48:06Z</dc:date>
    </item>
  </channel>
</rss>

