<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Vulnerability issue in wlc in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/vulnerability-issue-in-wlc/m-p/4602463#M1089669</link>
    <description>&lt;P&gt;Not familiar with Tanable but I believe so. Any Penatration tester out there can ensure you the network is secure, or at least less vulnerable with those action.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Of course, security is layers and layers starting with users and going through techcnologies but from telecom perspective, this action I told , can help for sure.&lt;/P&gt;</description>
    <pubDate>Fri, 29 Apr 2022 14:20:24 GMT</pubDate>
    <dc:creator>Flavio Miranda</dc:creator>
    <dc:date>2022-04-29T14:20:24Z</dc:date>
    <item>
      <title>Vulnerability issue in wlc</title>
      <link>https://community.cisco.com/t5/network-security/vulnerability-issue-in-wlc/m-p/4599518#M1089517</link>
      <description>&lt;P&gt;Hi We have wlc. and got the below vulnerability message from tenable. Now I have two questions:&lt;/P&gt;&lt;P&gt;1, in addition to upgrading ios, there is other way to resolve it?&lt;/P&gt;&lt;P&gt;2. We scan all devices all the time, and we did not get the below warning message before, why the below warning message come to up this time scan? can we say scan standard change? Thank you&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cisco Wireless LAN Controller Secure Shell (SSH) Denial of Service Vulnerability (cisco-sa-20191016-wlc-ssh-dos)&lt;/P&gt;&lt;P&gt;According to its self-reported version, Cisco Wireless LAN Controller (WLC) is affected by a denial of service (DoS)&lt;/P&gt;</description>
      <pubDate>Mon, 25 Apr 2022 19:21:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vulnerability-issue-in-wlc/m-p/4599518#M1089517</guid>
      <dc:creator>Leftz</dc:creator>
      <dc:date>2022-04-25T19:21:50Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability issue in wlc</title>
      <link>https://community.cisco.com/t5/network-security/vulnerability-issue-in-wlc/m-p/4599521#M1089518</link>
      <description>&lt;P&gt;&lt;A href="https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvp34148" target="_blank"&gt;https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvp34148&lt;/A&gt;&amp;nbsp;&amp;lt;- check this bug&lt;/P&gt;</description>
      <pubDate>Mon, 25 Apr 2022 19:24:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vulnerability-issue-in-wlc/m-p/4599521#M1089518</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-04-25T19:24:21Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability issue in wlc</title>
      <link>https://community.cisco.com/t5/network-security/vulnerability-issue-in-wlc/m-p/4599525#M1089519</link>
      <description>&lt;P&gt;"1, in addition to upgrading, there is other way to resolve it?"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Try to keep the WLC in a environment where the management is well controlled. Use a dedicated network for that. Use ACL CPU to allow only a few network or IP address to access the WLC using SSH.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;"2. We scan all devices all the time, and we did not get the below warning message before, why the below warning message come to up this time scan? can we say scan standard change? Thank you"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Something has change on the scan software.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;DoS is a vulneratiliry that affect any eletronic system in the whole world.&amp;nbsp; I very complicate protect against DoS.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 25 Apr 2022 19:33:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vulnerability-issue-in-wlc/m-p/4599525#M1089519</guid>
      <dc:creator>Flavio Miranda</dc:creator>
      <dc:date>2022-04-25T19:33:21Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability issue in wlc</title>
      <link>https://community.cisco.com/t5/network-security/vulnerability-issue-in-wlc/m-p/4599536#M1089520</link>
      <description>&lt;P&gt;Thanks for your reply.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The below message is from that link MHM provided.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Symptom:&lt;/STRONG&gt;&lt;SPAN&gt; A vulnerability in the Secure Shell (SSH) session management for Cisco Wireless LAN Controller (WLC) Software could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. &lt;STRONG&gt;The vulnerability is due to the SSH process not being properly deleted when a remote management connection to the device is disconnected&lt;/STRONG&gt;. An attacker could exploit this vulnerability by repeatedly performing a remote management connection to the device and terminating the connection in an unexpected manner. A successful exploit could allow the attacker to cause the SSH processes to fail to delete, which can lead to a system-wide denial of service (DoS) condition.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please see the highlighted above. Since the vulnerability is caused by improper SSH process, Looks like that the issue might be fixed by some change, do you think so?&amp;nbsp;&lt;/P&gt;&lt;P&gt;Or do we have&amp;nbsp;some commands change can fix this issue? Thanks&lt;/P&gt;</description>
      <pubDate>Mon, 25 Apr 2022 20:56:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vulnerability-issue-in-wlc/m-p/4599536#M1089520</guid>
      <dc:creator>Leftz</dc:creator>
      <dc:date>2022-04-25T20:56:45Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability issue in wlc</title>
      <link>https://community.cisco.com/t5/network-security/vulnerability-issue-in-wlc/m-p/4599584#M1089530</link>
      <description>&lt;P&gt;Please refer to&amp;nbsp;&lt;A href="https://www.cisco.com/c/en/us/support/docs/csa/cisco-sa-20191016-wlc-ssh-dos.html" target="_self"&gt;Cisco Wireless LAN Controller Secure Shell Denial of Service Vulnerability&lt;/A&gt; Security Bulletin.&lt;/P&gt;
&lt;P&gt;1.&amp;nbsp; There is no workaround.&amp;nbsp; Software upgrade fixes this security vulnerability.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;2.&amp;nbsp; This is a very old Security Bulletin.&amp;nbsp; It was announced in 2019.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 25 Apr 2022 23:13:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vulnerability-issue-in-wlc/m-p/4599584#M1089530</guid>
      <dc:creator>Leo Laohoo</dc:creator>
      <dc:date>2022-04-25T23:13:44Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability issue in wlc</title>
      <link>https://community.cisco.com/t5/network-security/vulnerability-issue-in-wlc/m-p/4602427#M1089665</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/178747"&gt;@Flavio Miranda&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;" Try to keep the WLC in a environment where the management is well controlled. Use a dedicated network for that. Use ACL CPU to allow only a few network or IP address to access the WLC using SSH. "&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Can you talk a little bit more detail about it? or give an example for it. I am interested in your comment. Thank you!&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 29 Apr 2022 13:27:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vulnerability-issue-in-wlc/m-p/4602427#M1089665</guid>
      <dc:creator>Leftz</dc:creator>
      <dc:date>2022-04-29T13:27:56Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability issue in wlc</title>
      <link>https://community.cisco.com/t5/network-security/vulnerability-issue-in-wlc/m-p/4602442#M1089666</link>
      <description>&lt;P&gt;Hi, sure thing.&lt;/P&gt;&lt;P&gt;&amp;nbsp;It is not uncommon that companies keep management ip address on the same network as data traffic. But, a good network design must create a separate network for Management only.&amp;nbsp; This network should be allowed only for networks admin. You can have a portal from where the admin can access the clients they will use to access network devices:&amp;nbsp; SSH, Web, etc.&lt;/P&gt;&lt;P&gt;&amp;nbsp;And this well-known network management must be permited on the device with ACL.&amp;nbsp; On Cisco WLC you can configure CPU ACL permiting only a specific network or IP address to send SSH and HTTPS request.&amp;nbsp; The same can be done on switches and router using Console and VTY ACL.&lt;/P&gt;&lt;P&gt;On this management network you can also allow traffic like Netflow, SNMP, Syslog, etc. Everything else, you let out of this network.&lt;/P&gt;&lt;P&gt;those are good practices and not hard to implement.&lt;/P&gt;</description>
      <pubDate>Fri, 29 Apr 2022 13:41:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vulnerability-issue-in-wlc/m-p/4602442#M1089666</guid>
      <dc:creator>Flavio Miranda</dc:creator>
      <dc:date>2022-04-29T13:41:16Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability issue in wlc</title>
      <link>https://community.cisco.com/t5/network-security/vulnerability-issue-in-wlc/m-p/4602458#M1089668</link>
      <description>&lt;P&gt;Thanks Flavio! so after adding ACL etc to the network system, how can we think it is effective? Tenable can tell that?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 29 Apr 2022 14:11:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vulnerability-issue-in-wlc/m-p/4602458#M1089668</guid>
      <dc:creator>Leftz</dc:creator>
      <dc:date>2022-04-29T14:11:10Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability issue in wlc</title>
      <link>https://community.cisco.com/t5/network-security/vulnerability-issue-in-wlc/m-p/4602463#M1089669</link>
      <description>&lt;P&gt;Not familiar with Tanable but I believe so. Any Penatration tester out there can ensure you the network is secure, or at least less vulnerable with those action.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Of course, security is layers and layers starting with users and going through techcnologies but from telecom perspective, this action I told , can help for sure.&lt;/P&gt;</description>
      <pubDate>Fri, 29 Apr 2022 14:20:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vulnerability-issue-in-wlc/m-p/4602463#M1089669</guid>
      <dc:creator>Flavio Miranda</dc:creator>
      <dc:date>2022-04-29T14:20:24Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability issue in wlc</title>
      <link>https://community.cisco.com/t5/network-security/vulnerability-issue-in-wlc/m-p/4602470#M1089670</link>
      <description>&lt;P&gt;Thank you all!&lt;/P&gt;</description>
      <pubDate>Fri, 29 Apr 2022 14:29:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vulnerability-issue-in-wlc/m-p/4602470#M1089670</guid>
      <dc:creator>Leftz</dc:creator>
      <dc:date>2022-04-29T14:29:23Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability issue in wlc</title>
      <link>https://community.cisco.com/t5/network-security/vulnerability-issue-in-wlc/m-p/4603380#M1089717</link>
      <description>&lt;P&gt;Hi The WLC has three ssid: Corp, BYOD and Guest. If we do CPU ACL to resolve the issue, what traffic should we block? Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 02 May 2022 18:07:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vulnerability-issue-in-wlc/m-p/4603380#M1089717</guid>
      <dc:creator>Leftz</dc:creator>
      <dc:date>2022-05-02T18:07:57Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability issue in wlc</title>
      <link>https://community.cisco.com/t5/network-security/vulnerability-issue-in-wlc/m-p/4603389#M1089718</link>
      <description>&lt;P&gt;Nop., ACL CPU only blocks traffic destinated to the WLC itself. It does not block users traffic on the SSID.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 02 May 2022 18:27:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vulnerability-issue-in-wlc/m-p/4603389#M1089718</guid>
      <dc:creator>Flavio Miranda</dc:creator>
      <dc:date>2022-05-02T18:27:36Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability issue in wlc</title>
      <link>https://community.cisco.com/t5/network-security/vulnerability-issue-in-wlc/m-p/4603394#M1089719</link>
      <description>&lt;P&gt;Thanks. but in order to configure CPU ACL, we have to indicate what traffic should be blocked and then associated it with CPU. Is this correct? if this is case, what traffic needs to be defined?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 02 May 2022 18:40:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vulnerability-issue-in-wlc/m-p/4603394#M1089719</guid>
      <dc:creator>Leftz</dc:creator>
      <dc:date>2022-05-02T18:40:14Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability issue in wlc</title>
      <link>https://community.cisco.com/t5/network-security/vulnerability-issue-in-wlc/m-p/4603397#M1089720</link>
      <description>&lt;P&gt;Yes correct. But this traffic will come from the Wired network and those traffic must be:&amp;nbsp; Telnet, SSH, SNMP,Netflow, Syslog etc. Management traffic.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 02 May 2022 18:40:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vulnerability-issue-in-wlc/m-p/4603397#M1089720</guid>
      <dc:creator>Flavio Miranda</dc:creator>
      <dc:date>2022-05-02T18:40:17Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability issue in wlc</title>
      <link>https://community.cisco.com/t5/network-security/vulnerability-issue-in-wlc/m-p/4622853#M1090564</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/178747"&gt;@Flavio Miranda&lt;/a&gt;&amp;nbsp;We just tried the ACL, but it cannot work, which means we still can get the same scan result as before. Please see below. the Seq 5 and 6 are to permit our accessing to the wlc ip address and block all others. Is there some step wrong? Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="1.PNG" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/152578i86174125BEF5E849/image-size/large?v=v2&amp;amp;px=999" role="button" title="1.PNG" alt="1.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 01 Jun 2022 20:53:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vulnerability-issue-in-wlc/m-p/4622853#M1090564</guid>
      <dc:creator>Leftz</dc:creator>
      <dc:date>2022-06-01T20:53:39Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability issue in wlc</title>
      <link>https://community.cisco.com/t5/network-security/vulnerability-issue-in-wlc/m-p/4623166#M1090581</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Yes, you did it wrong. This ACL permits everyting to access your WLC on port 443. Please, read this post all over again and see the part I talk about to have a management network from where you should manage your devices, wlc included.&lt;/P&gt;
&lt;P&gt;This Access List must have a specific source and the WLC as destination. If you allow everything, why do you need the ACL in the first place?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 02 Jun 2022 10:18:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vulnerability-issue-in-wlc/m-p/4623166#M1090581</guid>
      <dc:creator>Flavio Miranda</dc:creator>
      <dc:date>2022-06-02T10:18:29Z</dc:date>
    </item>
  </channel>
</rss>

