<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic SSH Prefix Truncation Vulnerability (Terrapin) in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ssh-prefix-truncation-vulnerability-terrapin/m-p/5309388#M597263</link>
    <description>&lt;P&gt;Hi Community,&lt;/P&gt;&lt;P&gt;During a recent VAPT assessment, the &lt;STRONG&gt;SSH Prefix Truncation Vulnerability (Terrapin) — CVE-2023-48795&lt;/STRONG&gt; — was flagged on our Cisco ISE deployment (&lt;STRONG&gt;version 3.3 Patch 4&lt;/STRONG&gt;).&lt;/P&gt;&lt;P&gt;I have checked Cisco’s official vulnerability repository, and the status for this CVE currently shows as "Under Investigation":&lt;BR /&gt;&lt;span class="lia-unicode-emoji" title=":link:"&gt;🔗&lt;/span&gt; &lt;A href="https://sec.cloudapps.cisco.com/security/center/cvr?cveIdList=CVE-2023-48795#~cve" target="_new" rel="noopener"&gt;Cisco Security Advisory for CVE-2023-48795&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="rahulnaik_0-1752561119129.png" style="width: 745px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/248293i8D6FB4A8CCE23677/image-dimensions/745x146?v=v2" width="745" height="146" role="button" title="rahulnaik_0-1752561119129.png" alt="rahulnaik_0-1752561119129.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;As this is a compliance priority, I’m looking for any recommended workaround or guidance to remediate or mitigate this vulnerability until an official fix is released. I’ve gone through the admin guides and release notes, but couldn't find any specific instructions related to disabling vulnerable SSH algorithms or hardening SSH configs on ISE.&lt;/P&gt;&lt;P&gt;Has anyone successfully addressed or suppressed this VAPT finding for Cisco ISE? Any help, workaround, or clarification from Cisco TAC or the community would be highly appreciated.&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;</description>
    <pubDate>Tue, 15 Jul 2025 06:34:12 GMT</pubDate>
    <dc:creator>rahulnaik</dc:creator>
    <dc:date>2025-07-15T06:34:12Z</dc:date>
    <item>
      <title>SSH Prefix Truncation Vulnerability (Terrapin)</title>
      <link>https://community.cisco.com/t5/network-access-control/ssh-prefix-truncation-vulnerability-terrapin/m-p/5309388#M597263</link>
      <description>&lt;P&gt;Hi Community,&lt;/P&gt;&lt;P&gt;During a recent VAPT assessment, the &lt;STRONG&gt;SSH Prefix Truncation Vulnerability (Terrapin) — CVE-2023-48795&lt;/STRONG&gt; — was flagged on our Cisco ISE deployment (&lt;STRONG&gt;version 3.3 Patch 4&lt;/STRONG&gt;).&lt;/P&gt;&lt;P&gt;I have checked Cisco’s official vulnerability repository, and the status for this CVE currently shows as "Under Investigation":&lt;BR /&gt;&lt;span class="lia-unicode-emoji" title=":link:"&gt;🔗&lt;/span&gt; &lt;A href="https://sec.cloudapps.cisco.com/security/center/cvr?cveIdList=CVE-2023-48795#~cve" target="_new" rel="noopener"&gt;Cisco Security Advisory for CVE-2023-48795&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="rahulnaik_0-1752561119129.png" style="width: 745px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/248293i8D6FB4A8CCE23677/image-dimensions/745x146?v=v2" width="745" height="146" role="button" title="rahulnaik_0-1752561119129.png" alt="rahulnaik_0-1752561119129.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;As this is a compliance priority, I’m looking for any recommended workaround or guidance to remediate or mitigate this vulnerability until an official fix is released. I’ve gone through the admin guides and release notes, but couldn't find any specific instructions related to disabling vulnerable SSH algorithms or hardening SSH configs on ISE.&lt;/P&gt;&lt;P&gt;Has anyone successfully addressed or suppressed this VAPT finding for Cisco ISE? Any help, workaround, or clarification from Cisco TAC or the community would be highly appreciated.&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;</description>
      <pubDate>Tue, 15 Jul 2025 06:34:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ssh-prefix-truncation-vulnerability-terrapin/m-p/5309388#M597263</guid>
      <dc:creator>rahulnaik</dc:creator>
      <dc:date>2025-07-15T06:34:12Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Prefix Truncation Vulnerability (Terrapin)</title>
      <link>https://community.cisco.com/t5/network-access-control/ssh-prefix-truncation-vulnerability-terrapin/m-p/5309473#M597264</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; -&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1885612"&gt;@rahulnaik&lt;/a&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Ref :&amp;nbsp;&amp;nbsp;&lt;A href="https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwm87186" target="_blank"&gt;https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwm87186&lt;/A&gt;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; The bug report has a&lt;FONT color="#008000"&gt;&lt;STRONG&gt; Fixed&lt;/STRONG&gt;&lt;/FONT&gt; status but no &lt;FONT color="#FF6600"&gt;&lt;EM&gt;Known Fixed Releases&lt;/EM&gt;&lt;/FONT&gt; are provided ,&amp;nbsp; that means that developers have fixed the issue but it is not yet incorporated in a production release.&amp;nbsp; &lt;EM&gt;Contact&lt;STRONG&gt; TAC&lt;/STRONG&gt; and ask for an ETA.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; M.&lt;/P&gt;</description>
      <pubDate>Tue, 15 Jul 2025 08:53:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ssh-prefix-truncation-vulnerability-terrapin/m-p/5309473#M597264</guid>
      <dc:creator>Mark Elsen</dc:creator>
      <dc:date>2025-07-15T08:53:02Z</dc:date>
    </item>
  </channel>
</rss>

