<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: 9396PX Terrapin Fix/patch in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/9396px-terrapin-fix-patch/m-p/4997787#M1108000</link>
    <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/149312"&gt;@douglas.mckee&lt;/a&gt; you'd need to ensure the version of NXOS supports and your SSH client both support GCM. You may need to upgrade the NXOS version.&lt;/P&gt;
&lt;P&gt;I would make the change whilst onsite, so you can connect via console if there is a problem.&lt;/P&gt;
&lt;P&gt;If you NXOS does not support GCM you could enable AES-CTR - "CTR-mode ciphers in combination with the Encrypt-then-MAC paradigm are vulnerable as well, although this weakness cannot be exploited in a real-world scenario." &lt;A href="https://terrapin-attack.com/" target="_blank"&gt;https://terrapin-attack.com/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 16 Jan 2024 17:28:03 GMT</pubDate>
    <dc:creator>Rob Ingram</dc:creator>
    <dc:date>2024-01-16T17:28:03Z</dc:date>
    <item>
      <title>9396PX Terrapin Fix/patch</title>
      <link>https://community.cisco.com/t5/network-security/9396px-terrapin-fix-patch/m-p/4995749#M1107905</link>
      <description>&lt;P&gt;Good morning,&lt;/P&gt;&lt;P&gt;I realize our 9396PX's are EOL but we won't be replacing them until later this year. These devices are currently popping hot on the "SSH Terrapin Prefix Truncation Weakness (CVE-2023-48795)".&amp;nbsp; When I do a "sh ssh key rsa" it shows only SHA256 encryption and no other encryption algorithms. The running-config doesn't show the "&lt;SPAN&gt;ChaCha20-Poly1305 or CBC" anywhere in the config. Under Global configuration "ssh ciphers" I'm only seeing these 2 options:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;1. aes256-gcm (Enable aes256-gcm)&lt;BR /&gt;2. all (Enable algorithms supported in current version of SSH)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;The "all" enables all the ciphers to include the "CBC" ciphers which is probably what our ACAS scanner is detecting.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Has anyone else ran into this issue or have a solution that would work in mitigating this threat?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thank you,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Doug&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;------------------------------------------------------------------------------------------------------&lt;/SPAN&gt; &lt;SPAN&gt;The remote SSH server is vulnerable to a mitm prefix truncation attack.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;H4&gt;Description&lt;/H4&gt;&lt;P&gt;&lt;SPAN&gt;The remote SSH server is vulnerable to a man-in-the-middle prefix truncation weakness known as Terrapin. This can allow a remote, man-in-the-middle attacker to bypass integrity checks and downgrade the connection's security.&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;Note that this plugin only checks for remote SSH servers that support either ChaCha20-Poly1305 or CBC with Encrypt-then-MAC and do not support the strict key exchange countermeasures. It does not check for vulnerable software versions.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;H4&gt;Solution&lt;/H4&gt;&lt;P&gt;&lt;SPAN&gt;Contact the vendor for an update with the strict key exchange countermeasures or disable the affected algorithms.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 12 Jan 2024 20:11:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/9396px-terrapin-fix-patch/m-p/4995749#M1107905</guid>
      <dc:creator>douglas.mckee</dc:creator>
      <dc:date>2024-01-12T20:11:48Z</dc:date>
    </item>
    <item>
      <title>Re: 9396PX Terrapin Fix/patch</title>
      <link>https://community.cisco.com/t5/network-security/9396px-terrapin-fix-patch/m-p/4995835#M1107906</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/149312"&gt;@douglas.mckee&lt;/a&gt;&amp;nbsp;using AES GCM mitigates this issue, disable CBC.&lt;/P&gt;</description>
      <pubDate>Fri, 12 Jan 2024 21:38:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/9396px-terrapin-fix-patch/m-p/4995835#M1107906</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2024-01-12T21:38:47Z</dc:date>
    </item>
    <item>
      <title>Re: 9396PX Terrapin Fix/patch</title>
      <link>https://community.cisco.com/t5/network-security/9396px-terrapin-fix-patch/m-p/4995839#M1107908</link>
      <description>&lt;P&gt;check below thread similar and change the cipher as suggested in the post and test it&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.cisco.com/t5/network-security/ssh-terrapin-prefix-truncation-weakness/m-p/4995325#M1107891" target="_blank"&gt;https://community.cisco.com/t5/network-security/ssh-terrapin-prefix-truncation-weakness/m-p/4995325#M1107891&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 12 Jan 2024 21:40:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/9396px-terrapin-fix-patch/m-p/4995839#M1107908</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2024-01-12T21:40:11Z</dc:date>
    </item>
    <item>
      <title>Re: 9396PX Terrapin Fix/patch</title>
      <link>https://community.cisco.com/t5/network-security/9396px-terrapin-fix-patch/m-p/4997779#M1107999</link>
      <description>&lt;P&gt;Rob,&lt;/P&gt;&lt;P&gt;Correct. The AES GCM would mitigate this issue.&amp;nbsp;&lt;/P&gt;&lt;P&gt;1. How do I disable the CBC in NX-OS since there doesn't appear to be an option to removed specific ciphers?&lt;/P&gt;&lt;P&gt;2. Other posts have mentioned enabling AES GCM caused them to lose SSH connectivity to their switch. Is there anything prior to implementing this that would mitigate this issue?&lt;/P&gt;&lt;P&gt;Thank you,&lt;/P&gt;&lt;P&gt;Doug&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 16 Jan 2024 17:07:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/9396px-terrapin-fix-patch/m-p/4997779#M1107999</guid>
      <dc:creator>douglas.mckee</dc:creator>
      <dc:date>2024-01-16T17:07:19Z</dc:date>
    </item>
    <item>
      <title>Re: 9396PX Terrapin Fix/patch</title>
      <link>https://community.cisco.com/t5/network-security/9396px-terrapin-fix-patch/m-p/4997787#M1108000</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/149312"&gt;@douglas.mckee&lt;/a&gt; you'd need to ensure the version of NXOS supports and your SSH client both support GCM. You may need to upgrade the NXOS version.&lt;/P&gt;
&lt;P&gt;I would make the change whilst onsite, so you can connect via console if there is a problem.&lt;/P&gt;
&lt;P&gt;If you NXOS does not support GCM you could enable AES-CTR - "CTR-mode ciphers in combination with the Encrypt-then-MAC paradigm are vulnerable as well, although this weakness cannot be exploited in a real-world scenario." &lt;A href="https://terrapin-attack.com/" target="_blank"&gt;https://terrapin-attack.com/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 16 Jan 2024 17:28:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/9396px-terrapin-fix-patch/m-p/4997787#M1108000</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2024-01-16T17:28:03Z</dc:date>
    </item>
    <item>
      <title>Re: 9396PX Terrapin Fix/patch</title>
      <link>https://community.cisco.com/t5/network-security/9396px-terrapin-fix-patch/m-p/5036682#M1109743</link>
      <description>&lt;P&gt;&lt;STRONG&gt;Workround:&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Primero: Upgrade de firmware a la version 10.2.7&lt;/P&gt;&lt;P&gt;Segundo: modificar config de &lt;STRONG&gt;dcos_sshd_config, eliminar el algoritmo de cifrado &lt;A href="mailto:chacha20-poly1305@openssh.com" target="_blank"&gt;chacha20-poly1305@openssh.com&lt;/A&gt;.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;documentación:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;A href="https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwi60493" target="_blank"&gt;https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwi60493&lt;/A&gt;&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 08 Mar 2024 17:16:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/9396px-terrapin-fix-patch/m-p/5036682#M1109743</guid>
      <dc:creator>RicardoHuamaniAllcca89890</dc:creator>
      <dc:date>2024-03-08T17:16:48Z</dc:date>
    </item>
    <item>
      <title>Re: 9396PX Terrapin Fix/patch</title>
      <link>https://community.cisco.com/t5/network-security/9396px-terrapin-fix-patch/m-p/5037421#M1109770</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Our ACAS scanner is flagging the "SSH Terrapin Prefix Truncation Weakness (CVE-2023-48795)" on these devices, and upon inspection, it appears that only SHA256 encryption is being used, with no other encryption algorithms present. Furthermore, the running-config does not show any evidence of the "ChaCha20-Poly1305 or CBC" encryption, which is likely contributing to the vulnerability detection. Under Global configuration, the "ssh ciphers" command reveals only two options: "aes256-gcm" and "all," with the latter enabling all ciphers, including potentially insecure CBC ciphers.&amp;nbsp;&lt;BR /&gt;Regards&amp;nbsp;&amp;nbsp;&lt;A href="https://yesnowheel.pro/" target="_self"&gt;&lt;FONT color="#FFFFFF"&gt;yesnowheel&lt;/FONT&gt;&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2024 07:25:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/9396px-terrapin-fix-patch/m-p/5037421#M1109770</guid>
      <dc:creator>Rayan Alden</dc:creator>
      <dc:date>2024-03-12T07:25:56Z</dc:date>
    </item>
  </channel>
</rss>

