<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco IOS and IOS XE Software Cluster Management Protocol Remote C in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-ios-and-ios-xe-software-cluster-management-protocol-remote/m-p/5035746#M1109713</link>
    <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1500030"&gt;@dissai&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;U&gt;Disabling the Telnet protocol as an allowed protocol for incoming connections would eliminate the exploit vector&lt;/U&gt;&lt;/EM&gt;. Disabling Telnet and using SSH is recommended by Cisco. Information on how to do both can be found on the &lt;A href="http://www.cisco.com/c/en/us/support/docs/ip/access-lists/13608-21.html" target="_blank" rel="noopener"&gt;Cisco Guide to Harden Cisco IOS Devices&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;refer to this advisory - &lt;A href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170317-cmp" target="_blank"&gt;https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170317-cmp&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 07 Mar 2024 10:16:10 GMT</pubDate>
    <dc:creator>Rob Ingram</dc:creator>
    <dc:date>2024-03-07T10:16:10Z</dc:date>
    <item>
      <title>Cisco IOS and IOS XE Software Cluster Management Protocol Remote Code</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ios-and-ios-xe-software-cluster-management-protocol-remote/m-p/5035731#M1109712</link>
      <description>&lt;P&gt;Dear&amp;nbsp; Friends,&lt;/P&gt;&lt;P&gt;I'm looking for solution to resolve below vulnerability for Cisco router ISR4331&lt;/P&gt;&lt;P&gt;Cisco IOS and IOS XE Software Cluster Management Protocol Remote Code Execution Vulnerability (cisco-sa-20170317-cmp)&lt;/P&gt;&lt;P&gt;I have attached the screen shot.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;DI&lt;/P&gt;</description>
      <pubDate>Thu, 07 Mar 2024 10:08:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ios-and-ios-xe-software-cluster-management-protocol-remote/m-p/5035731#M1109712</guid>
      <dc:creator>dissai</dc:creator>
      <dc:date>2024-03-07T10:08:44Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco IOS and IOS XE Software Cluster Management Protocol Remote C</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ios-and-ios-xe-software-cluster-management-protocol-remote/m-p/5035746#M1109713</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1500030"&gt;@dissai&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;U&gt;Disabling the Telnet protocol as an allowed protocol for incoming connections would eliminate the exploit vector&lt;/U&gt;&lt;/EM&gt;. Disabling Telnet and using SSH is recommended by Cisco. Information on how to do both can be found on the &lt;A href="http://www.cisco.com/c/en/us/support/docs/ip/access-lists/13608-21.html" target="_blank" rel="noopener"&gt;Cisco Guide to Harden Cisco IOS Devices&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;refer to this advisory - &lt;A href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170317-cmp" target="_blank"&gt;https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170317-cmp&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 07 Mar 2024 10:16:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ios-and-ios-xe-software-cluster-management-protocol-remote/m-p/5035746#M1109713</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2024-03-07T10:16:10Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco IOS and IOS XE Software Cluster Management Protocol Remote C</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ios-and-ios-xe-software-cluster-management-protocol-remote/m-p/5035757#M1109714</link>
      <description>Hello Roby,&lt;BR /&gt;&lt;BR /&gt;See below output. I have not allowed telnet and still I'm getting the&lt;BR /&gt;vulnerability query.&lt;BR /&gt;&lt;BR /&gt;SERVICE-RT#&lt;BR /&gt;SERVICE-RT#show run | sec line vty&lt;BR /&gt;line vty 0 4&lt;BR /&gt;exec-timeout 60 0&lt;BR /&gt;privilege level 15&lt;BR /&gt;transport input ssh&lt;BR /&gt;transport output none&lt;BR /&gt;line vty 5 15&lt;BR /&gt;exec-timeout 60 0&lt;BR /&gt;privilege level 15&lt;BR /&gt;transport input ssh&lt;BR /&gt;transport output none&lt;BR /&gt;SERVICE-RT#&lt;BR /&gt;&lt;BR /&gt;Another router has the same issue.&lt;BR /&gt;&lt;BR /&gt;line vty 0 4&lt;BR /&gt;transport input ssh&lt;BR /&gt;transport output ssh&lt;BR /&gt;line vty 5&lt;BR /&gt;privilege level 15&lt;BR /&gt;transport input ssh&lt;BR /&gt;transport output ssh&lt;BR /&gt;line vty 6 14&lt;BR /&gt;transport input ssh&lt;BR /&gt;line vty 15&lt;BR /&gt;session-timeout 10 output&lt;BR /&gt;transport input ssh&lt;BR /&gt;</description>
      <pubDate>Thu, 07 Mar 2024 10:21:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ios-and-ios-xe-software-cluster-management-protocol-remote/m-p/5035757#M1109714</guid>
      <dc:creator>dissai</dc:creator>
      <dc:date>2024-03-07T10:21:36Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco IOS and IOS XE Software Cluster Management Protocol Remote C</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ios-and-ios-xe-software-cluster-management-protocol-remote/m-p/5035776#M1109715</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1500030"&gt;@dissai&lt;/a&gt; From your output you've enabled only SSH on all VTY lines and from that &lt;A href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170317-cmp" target="_self"&gt;link&lt;/A&gt; I provided:-&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;The SSH protocol is the only protocol enabled for incoming connections on all VTYs. No Telnet connections are possible to any VTY on the device while using this configuration. &lt;EM&gt;&lt;STRONG&gt;This configuration is not vulnerable.&lt;/STRONG&gt;&lt;/EM&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;BLOCKQUOTE&gt;
&lt;PRE&gt;Switch#show running-config | include ^line vty|transport input
line vty 0 4
 transport input ssh
line vty 5 15
 transport input ssh
Switch#&lt;/PRE&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;I suggestion would be to upgrade your software to remove the vulnerability.&lt;/P&gt;
&lt;P&gt;You should as a best practice have a VTY ACL restricting trusted networks to connect on SSH only.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;LI-WRAPPER&gt;&lt;/LI-WRAPPER&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 07 Mar 2024 10:33:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ios-and-ios-xe-software-cluster-management-protocol-remote/m-p/5035776#M1109715</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2024-03-07T10:33:17Z</dc:date>
    </item>
  </channel>
</rss>

