<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Weak SSL/TLS Key Exchange in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/weak-ssl-tls-key-exchange/m-p/5072780#M1111410</link>
    <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1657352"&gt;@mohammedalrawiib&lt;/a&gt; what commands did you configure? Provide the configuration.&lt;/P&gt;
&lt;P&gt;Did you use the command - &lt;STRONG&gt;no ip http secure-server &lt;/STRONG&gt;to disable https server?&lt;/P&gt;
&lt;P&gt;You could also apply an ACL to restrict traffic to trusted sources, that would help mitigate the issue.&lt;/P&gt;</description>
    <pubDate>Thu, 18 Apr 2024 09:27:13 GMT</pubDate>
    <dc:creator>Rob Ingram</dc:creator>
    <dc:date>2024-04-18T09:27:13Z</dc:date>
    <item>
      <title>Weak SSL/TLS Key Exchange</title>
      <link>https://community.cisco.com/t5/network-security/weak-ssl-tls-key-exchange/m-p/5072776#M1111409</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;/P&gt;&lt;P&gt;I hope your doing well&amp;nbsp;&lt;/P&gt;&lt;P&gt;in our network infrastructure&amp;nbsp; where we have Qualys to scan for vulnerabilities i can't find a solution for this certain vulnerability here are the details :&lt;/P&gt;&lt;P&gt;Weak SSL/TLS Key Exchange&amp;nbsp;&lt;/P&gt;&lt;P&gt;impact an attacker with access to sufficient computational power might be able to recover the session key and decrypt session content&amp;nbsp;&lt;/P&gt;&lt;P&gt;i have tried the suggested solution from both community cisco but when we i scan again the vulnerability remains the same , the solution that i have tried is to disable SSL/TLS on the switches after scanning it still shows the same vulnerability ,also i have tried to configure the cipher suite with AES 256 the vulnerability remains the same .&lt;/P&gt;&lt;P&gt;the switch we have is cisco 9200 version&amp;nbsp;&lt;SPAN&gt;&lt;SPAN class=""&gt;17.6&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;best regards&lt;/P&gt;</description>
      <pubDate>Thu, 18 Apr 2024 09:15:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/weak-ssl-tls-key-exchange/m-p/5072776#M1111409</guid>
      <dc:creator>mohammedalrawiib</dc:creator>
      <dc:date>2024-04-18T09:15:07Z</dc:date>
    </item>
    <item>
      <title>Re: Weak SSL/TLS Key Exchange</title>
      <link>https://community.cisco.com/t5/network-security/weak-ssl-tls-key-exchange/m-p/5072780#M1111410</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1657352"&gt;@mohammedalrawiib&lt;/a&gt; what commands did you configure? Provide the configuration.&lt;/P&gt;
&lt;P&gt;Did you use the command - &lt;STRONG&gt;no ip http secure-server &lt;/STRONG&gt;to disable https server?&lt;/P&gt;
&lt;P&gt;You could also apply an ACL to restrict traffic to trusted sources, that would help mitigate the issue.&lt;/P&gt;</description>
      <pubDate>Thu, 18 Apr 2024 09:27:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/weak-ssl-tls-key-exchange/m-p/5072780#M1111410</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2024-04-18T09:27:13Z</dc:date>
    </item>
    <item>
      <title>Re: Weak SSL/TLS Key Exchange</title>
      <link>https://community.cisco.com/t5/network-security/weak-ssl-tls-key-exchange/m-p/5072782#M1111411</link>
      <description>&lt;P&gt;Yes i tried to use the command&amp;nbsp;&lt;STRONG&gt;no ip http secure-server &lt;/STRONG&gt;but the vulnerability remains in the scan report&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 18 Apr 2024 09:29:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/weak-ssl-tls-key-exchange/m-p/5072782#M1111411</guid>
      <dc:creator>mohammedalrawiib</dc:creator>
      <dc:date>2024-04-18T09:29:34Z</dc:date>
    </item>
    <item>
      <title>Re: Weak SSL/TLS Key Exchange</title>
      <link>https://community.cisco.com/t5/network-security/weak-ssl-tls-key-exchange/m-p/5072786#M1111412</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1657352"&gt;@mohammedalrawiib&lt;/a&gt; with that command, https on the switch is disabled and should not respond.&lt;/P&gt;
&lt;P&gt;Are you sure a new scan was run after that command was configured?&lt;/P&gt;
&lt;P&gt;Provide your configuration&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 18 Apr 2024 09:36:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/weak-ssl-tls-key-exchange/m-p/5072786#M1111412</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2024-04-18T09:36:56Z</dc:date>
    </item>
    <item>
      <title>Re: Weak SSL/TLS Key Exchange</title>
      <link>https://community.cisco.com/t5/network-security/weak-ssl-tls-key-exchange/m-p/5073001#M1111417</link>
      <description>&lt;P&gt;tried to scan 2 times and the vulnerability still remains is there anything i can try ?&lt;/P&gt;&lt;P&gt;can't provide configuration right now, will provide on Sunday&amp;nbsp;&lt;/P&gt;&lt;P&gt;regards&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 18 Apr 2024 12:38:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/weak-ssl-tls-key-exchange/m-p/5073001#M1111417</guid>
      <dc:creator>mohammedalrawiib</dc:creator>
      <dc:date>2024-04-18T12:38:23Z</dc:date>
    </item>
    <item>
      <title>Re: Weak SSL/TLS Key Exchange</title>
      <link>https://community.cisco.com/t5/network-security/weak-ssl-tls-key-exchange/m-p/5118512#M1113048</link>
      <description>&lt;P&gt;Dears&amp;nbsp;&lt;/P&gt;&lt;P&gt;after a while we changed the ssh port number (default is 22) to another port also we blocked 22 port then the vulnerability was removed this is the solution that we found if you have any other solution please let us know&amp;nbsp;&lt;/P&gt;&lt;P&gt;best regards&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 28 May 2024 12:53:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/weak-ssl-tls-key-exchange/m-p/5118512#M1113048</guid>
      <dc:creator>mohammedalrawiib</dc:creator>
      <dc:date>2024-05-28T12:53:11Z</dc:date>
    </item>
  </channel>
</rss>

