<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Vulnerability issue at C3650 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/vulnerability-issue-at-c3650/m-p/4660550#M1092268</link>
    <description>&lt;P&gt;&lt;SPAN&gt;CSCvd48893&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;check this bug I think you hit it&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 29 Jul 2022 22:28:13 GMT</pubDate>
    <dc:creator>MHM Cisco World</dc:creator>
    <dc:date>2022-07-29T22:28:13Z</dc:date>
    <item>
      <title>Vulnerability issue at C3650</title>
      <link>https://community.cisco.com/t5/network-security/vulnerability-issue-at-c3650/m-p/4660528#M1092266</link>
      <description>&lt;P&gt;Hi we got security vulnerability issue at C3650 sw. The below message is what we got. The telnet is disabled. Any suggestions for this issue? Thank you very much!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;An attacker could exploit this vulnerability by sending malformed CMP-specific Telnet options while establishing a Telnet session with an affected Cisco device configured to accept Telnet connections. An exploit could allow an attacker to execute arbitrary code and obtain full control of the device or cause a reload of the affected device.&lt;/P&gt;</description>
      <pubDate>Fri, 29 Jul 2022 21:44:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vulnerability-issue-at-c3650/m-p/4660528#M1092266</guid>
      <dc:creator>Leftz</dc:creator>
      <dc:date>2022-07-29T21:44:28Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability issue at C3650</title>
      <link>https://community.cisco.com/t5/network-security/vulnerability-issue-at-c3650/m-p/4660550#M1092268</link>
      <description>&lt;P&gt;&lt;SPAN&gt;CSCvd48893&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;check this bug I think you hit it&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 29 Jul 2022 22:28:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vulnerability-issue-at-c3650/m-p/4660550#M1092268</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-07-29T22:28:13Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability issue at C3650</title>
      <link>https://community.cisco.com/t5/network-security/vulnerability-issue-at-c3650/m-p/4660560#M1092269</link>
      <description>&lt;P&gt;What firmware is the switch running on?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 29 Jul 2022 23:58:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vulnerability-issue-at-c3650/m-p/4660560#M1092269</guid>
      <dc:creator>Leo Laohoo</dc:creator>
      <dc:date>2022-07-29T23:58:31Z</dc:date>
    </item>
  </channel>
</rss>

