<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Weak SSL/TLS Key Exchange in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/weak-ssl-tls-key-exchange/m-p/5075243#M1111517</link>
    <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1657352"&gt;@mohammedalrawiib&lt;/a&gt; you asked this question is a separate thread last week: &lt;A href="https://community.cisco.com/t5/network-security/weak-ssl-tls-key-exchange/td-p/5072776" target="_blank"&gt;https://community.cisco.com/t5/network-security/weak-ssl-tls-key-exchange/td-p/5072776&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;At that time you said you were going to provide the running config but you have not yet done so.&lt;/P&gt;</description>
    <pubDate>Mon, 22 Apr 2024 13:35:24 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2024-04-22T13:35:24Z</dc:date>
    <item>
      <title>Weak SSL/TLS Key Exchange</title>
      <link>https://community.cisco.com/t5/network-security/weak-ssl-tls-key-exchange/m-p/5074909#M1111504</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;/P&gt;&lt;P&gt;I hope your doing well&amp;nbsp;&lt;/P&gt;&lt;P&gt;in our network infrastructure&amp;nbsp; where we have Qualys to scan for vulnerabilities i can't find a solution for this certain vulnerability here are the details :&lt;/P&gt;&lt;P&gt;Weak SSL/TLS Key Exchange&amp;nbsp;&lt;/P&gt;&lt;P&gt;impact an attacker with access to sufficient computational power might be able to recover the session key and decrypt session content&amp;nbsp;&lt;/P&gt;&lt;P&gt;i have tried the suggested solution from both community cisco but when we i scan again the vulnerability remains the same , the solution that i have tried is to disable SSL/TLS on the switches after scanning it still shows the same vulnerability ,also i have tried to configure the cipher suite with AES 256 the vulnerability remains the same .&lt;/P&gt;&lt;P&gt;the following commands were executed&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no ip http secure-server&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;the switch we have is cisco 9200 version&amp;nbsp;&lt;SPAN&gt;&lt;SPAN class=""&gt;17.6&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class=""&gt;regards&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 22 Apr 2024 05:58:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/weak-ssl-tls-key-exchange/m-p/5074909#M1111504</guid>
      <dc:creator>mohammedalrawiib</dc:creator>
      <dc:date>2024-04-22T05:58:45Z</dc:date>
    </item>
    <item>
      <title>Re: Weak SSL/TLS Key Exchange</title>
      <link>https://community.cisco.com/t5/network-security/weak-ssl-tls-key-exchange/m-p/5074925#M1111506</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Hello &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1657352"&gt;@mohammedalrawiib&lt;/a&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Configuration changes might require a reboot to take effect. Reboot the switch and re-scan to verify if the vulnerability persists.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Determine if there are other interfaces or modules on the switch that might be using SSL/TLS.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;will you share the output of&amp;nbsp; "show running-config".&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;gt;_&amp;lt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 22 Apr 2024 06:26:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/weak-ssl-tls-key-exchange/m-p/5074925#M1111506</guid>
      <dc:creator>Kumaresan Ravichandran</dc:creator>
      <dc:date>2024-04-22T06:26:24Z</dc:date>
    </item>
    <item>
      <title>Re: Weak SSL/TLS Key Exchange</title>
      <link>https://community.cisco.com/t5/network-security/weak-ssl-tls-key-exchange/m-p/5075049#M1111507</link>
      <description>&lt;P&gt;hello&amp;nbsp;&lt;/P&gt;&lt;P&gt;i can't reboot this will take our service down , i tried to enable it again they said it would remove it this is the config&amp;nbsp;&lt;/P&gt;&lt;P&gt;ip forward-protocol nd&lt;BR /&gt;no ip http server&lt;BR /&gt;ip http authentication local&lt;BR /&gt;no ip http secure-server&lt;BR /&gt;ip http secure-ciphersuite aes-256-cbc-sha&lt;BR /&gt;ip http tls-version&amp;nbsp;TLSv1.2&lt;/P&gt;</description>
      <pubDate>Mon, 22 Apr 2024 08:39:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/weak-ssl-tls-key-exchange/m-p/5075049#M1111507</guid>
      <dc:creator>mohammedalrawiib</dc:creator>
      <dc:date>2024-04-22T08:39:09Z</dc:date>
    </item>
    <item>
      <title>Re: Weak SSL/TLS Key Exchange</title>
      <link>https://community.cisco.com/t5/network-security/weak-ssl-tls-key-exchange/m-p/5075201#M1111514</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1657352"&gt;@mohammedalrawiib&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;When dealing with SSL/TLS vulnerabilities, particularly those related to key exchange, it can be frustrating when the recommended solutions don't seem to resolve the issue.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;If your goal is to mitigate the "Weak SSL/TLS Key Exchange" vulnerability, these commands can help ensure secure configurations. Then it is resolved right ?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I hope this helps resolve your vulnerability issue. If it is ok then mark your post to solved category.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Rate it too.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;gt;_&amp;lt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 22 Apr 2024 12:33:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/weak-ssl-tls-key-exchange/m-p/5075201#M1111514</guid>
      <dc:creator>Kumaresan Ravichandran</dc:creator>
      <dc:date>2024-04-22T12:33:07Z</dc:date>
    </item>
    <item>
      <title>Re: Weak SSL/TLS Key Exchange</title>
      <link>https://community.cisco.com/t5/network-security/weak-ssl-tls-key-exchange/m-p/5075243#M1111517</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1657352"&gt;@mohammedalrawiib&lt;/a&gt; you asked this question is a separate thread last week: &lt;A href="https://community.cisco.com/t5/network-security/weak-ssl-tls-key-exchange/td-p/5072776" target="_blank"&gt;https://community.cisco.com/t5/network-security/weak-ssl-tls-key-exchange/td-p/5072776&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;At that time you said you were going to provide the running config but you have not yet done so.&lt;/P&gt;</description>
      <pubDate>Mon, 22 Apr 2024 13:35:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/weak-ssl-tls-key-exchange/m-p/5075243#M1111517</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2024-04-22T13:35:24Z</dc:date>
    </item>
    <item>
      <title>Re: Weak SSL/TLS Key Exchange</title>
      <link>https://community.cisco.com/t5/network-security/weak-ssl-tls-key-exchange/m-p/5118513#M1113049</link>
      <description>&lt;P&gt;Dears&amp;nbsp;&lt;/P&gt;&lt;P&gt;after a while we changed the ssh port number (default is 22) to another port also we blocked 22 port then the vulnerability was removed this is the solution that we found if you have any other solution please let us know.&lt;/P&gt;&lt;P&gt;best regards&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 28 May 2024 12:53:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/weak-ssl-tls-key-exchange/m-p/5118513#M1113049</guid>
      <dc:creator>mohammedalrawiib</dc:creator>
      <dc:date>2024-05-28T12:53:35Z</dc:date>
    </item>
  </channel>
</rss>

