<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Vulnerability Scanning Mitigation needed in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/vulnerability-scanning-mitigation-needed/m-p/4400760#M1080669</link>
    <description>&lt;P&gt;If the certificate in question is the identity certificate used by SSL VPN clients, then replace it with a proper certificate issued by a public CA.&lt;/P&gt;</description>
    <pubDate>Tue, 11 May 2021 04:12:20 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2021-05-11T04:12:20Z</dc:date>
    <item>
      <title>Vulnerability Scanning Mitigation needed</title>
      <link>https://community.cisco.com/t5/network-security/vulnerability-scanning-mitigation-needed/m-p/4400676#M1080667</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can anyone please tell me the solution for mitigating the cisco ASA 5525 vulnerabilities?&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;FACTOR NAME&lt;/TD&gt;&lt;TD&gt;ISSUE TYPE TITLE&lt;/TD&gt;&lt;TD&gt;ISSUE TYPE CODE&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;Network Security&lt;/TD&gt;&lt;TD&gt;Certificate Without Revocation Control&lt;/TD&gt;&lt;TD&gt;tlscert_no_revocation&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Network Security&lt;/TD&gt;&lt;TD&gt;Certificate Without Revocation Control&lt;/TD&gt;&lt;TD&gt;tlscert_no_revocation&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Network Security&lt;/TD&gt;&lt;TD&gt;Certificate Lifetime Is Longer Than Best Practices&lt;/TD&gt;&lt;TD&gt;tlscert_excessive_expiration&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Network Security&lt;/TD&gt;&lt;TD&gt;Certificate Lifetime Is Longer Than Best Practices&lt;/TD&gt;&lt;TD&gt;tlscert_excessive_expiration&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Network Security&lt;/TD&gt;&lt;TD&gt;Certificate Signed With Weak Algorithm&lt;/TD&gt;&lt;TD&gt;tlscert_weak_signature&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Network Security&lt;/TD&gt;&lt;TD&gt;Certificate Signed With Weak Algorithm&lt;/TD&gt;&lt;TD&gt;tlscert_weak_signature&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 11 May 2021 03:04:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vulnerability-scanning-mitigation-needed/m-p/4400676#M1080667</guid>
      <dc:creator>Poo17</dc:creator>
      <dc:date>2021-05-11T03:04:08Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability Scanning Mitigation needed</title>
      <link>https://community.cisco.com/t5/network-security/vulnerability-scanning-mitigation-needed/m-p/4400760#M1080669</link>
      <description>&lt;P&gt;If the certificate in question is the identity certificate used by SSL VPN clients, then replace it with a proper certificate issued by a public CA.&lt;/P&gt;</description>
      <pubDate>Tue, 11 May 2021 04:12:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vulnerability-scanning-mitigation-needed/m-p/4400760#M1080669</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2021-05-11T04:12:20Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability Scanning Mitigation needed</title>
      <link>https://community.cisco.com/t5/network-security/vulnerability-scanning-mitigation-needed/m-p/4400769#M1080670</link>
      <description>&lt;P&gt;Hi Marvin,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for your reply. I am trying to decommission the SSL VPN because that service is not in use anymore. How can I do that?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you!&lt;/P&gt;</description>
      <pubDate>Tue, 11 May 2021 04:22:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vulnerability-scanning-mitigation-needed/m-p/4400769#M1080670</guid>
      <dc:creator>Poo17</dc:creator>
      <dc:date>2021-05-11T04:22:30Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability Scanning Mitigation needed</title>
      <link>https://community.cisco.com/t5/network-security/vulnerability-scanning-mitigation-needed/m-p/4400900#M1080675</link>
      <description>&lt;P&gt;If you want to shut it down, you can just remove the service from the outside interface:&lt;/P&gt;
&lt;PRE&gt;conf t
webvpn
disable outside &amp;lt;assuming that's your public interface name&amp;gt;
end
wr mem&lt;/PRE&gt;
&lt;P&gt;There is more involved to thoroughly clean up the configuration but the first step will remove the certificate from being exposed to the vulnerability scanning.&lt;/P&gt;</description>
      <pubDate>Tue, 11 May 2021 08:36:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vulnerability-scanning-mitigation-needed/m-p/4400900#M1080675</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2021-05-11T08:36:54Z</dc:date>
    </item>
  </channel>
</rss>

