<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: FTD and FMC 7.4.1.1 downgrades SSH to 9.1 - Now more vulnerable in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ftd-and-fmc-7-4-1-1-downgrades-ssh-to-9-1-now-more-vulnerable/m-p/5084250#M1111916</link>
    <description>&lt;P&gt;Opening a TAC case was the first thing I did. I was wondering if anyone else is encountering this, and if they are, what are they doing. Anyone who has to meet any sort of compliance should be talking about this. It's odd that it's eerily quiet.&lt;/P&gt;</description>
    <pubDate>Tue, 30 Apr 2024 12:23:07 GMT</pubDate>
    <dc:creator>kbenedict1</dc:creator>
    <dc:date>2024-04-30T12:23:07Z</dc:date>
    <item>
      <title>FTD and FMC 7.4.1.1 downgrades SSH to 9.1 - Now more vulnerable</title>
      <link>https://community.cisco.com/t5/network-security/ftd-and-fmc-7-4-1-1-downgrades-ssh-to-9-1-now-more-vulnerable/m-p/5083534#M1111882</link>
      <description>&lt;P&gt;Title says it all. Anyone encounter this yet?&lt;/P&gt;</description>
      <pubDate>Tue, 30 Apr 2024 03:09:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-and-fmc-7-4-1-1-downgrades-ssh-to-9-1-now-more-vulnerable/m-p/5083534#M1111882</guid>
      <dc:creator>kbenedict1</dc:creator>
      <dc:date>2024-04-30T03:09:29Z</dc:date>
    </item>
    <item>
      <title>Re: FTD and FMC 7.4.1.1 downgrades SSH to 9.1 - Now more vulnerable</title>
      <link>https://community.cisco.com/t5/network-security/ftd-and-fmc-7-4-1-1-downgrades-ssh-to-9-1-now-more-vulnerable/m-p/5083585#M1111884</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;U&gt;&amp;nbsp; &amp;nbsp; &lt;FONT color="#FF6600"&gt;&lt;EM&gt;&amp;nbsp; &amp;gt;...&lt;/EM&gt;&lt;/FONT&gt;&lt;/U&gt;&lt;SPAN&gt;&lt;U&gt;&lt;FONT color="#FF6600"&gt;&lt;EM&gt;Title says it all.&lt;/EM&gt;&lt;/FONT&gt;&lt;/U&gt;&lt;BR /&gt;&amp;nbsp;- It doesn't or even 'far less' ;&lt;BR /&gt;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; - How did you determine that SSH was downgraded , how do you retrieve the 9.1 version info ?&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; - Why do you think it is now more vulnerable ? What &lt;EM&gt;testing methodologies&lt;/EM&gt; did you use to conclude that ?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;M.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 30 Apr 2024 05:42:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-and-fmc-7-4-1-1-downgrades-ssh-to-9-1-now-more-vulnerable/m-p/5083585#M1111884</guid>
      <dc:creator>Mark Elsen</dc:creator>
      <dc:date>2024-04-30T05:42:11Z</dc:date>
    </item>
    <item>
      <title>Re: FTD and FMC 7.4.1.1 downgrades SSH to 9.1 - Now more vulnerable</title>
      <link>https://community.cisco.com/t5/network-security/ftd-and-fmc-7-4-1-1-downgrades-ssh-to-9-1-now-more-vulnerable/m-p/5083965#M1111907</link>
      <description>﻿&lt;BR /&gt;Putty event log reports 9.1 is the remote client.&lt;BR /&gt;&lt;BR /&gt;Nessus scan reports 9.1.&lt;BR /&gt;&lt;BR /&gt;CVE-2023-48795, CVE-2023-51384, CVE-2023-51385 are the known vulnerabilities.&lt;BR /&gt;&lt;BR /&gt;Any other questions? I was hoping for a Cisco response on why they’re are packaging vulnerable versions of SSH in new software upgrades, not a challenge of basic understanding of viewing a putty log and looking up known CVEs.&lt;BR /&gt;</description>
      <pubDate>Tue, 30 Apr 2024 10:41:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-and-fmc-7-4-1-1-downgrades-ssh-to-9-1-now-more-vulnerable/m-p/5083965#M1111907</guid>
      <dc:creator>kbenedict1</dc:creator>
      <dc:date>2024-04-30T10:41:09Z</dc:date>
    </item>
    <item>
      <title>Re: FTD and FMC 7.4.1.1 downgrades SSH to 9.1 - Now more vulnerable</title>
      <link>https://community.cisco.com/t5/network-security/ftd-and-fmc-7-4-1-1-downgrades-ssh-to-9-1-now-more-vulnerable/m-p/5084241#M1111914</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;EM&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;gt;...&amp;nbsp;I was hoping for a &lt;U&gt;&lt;FONT color="#FF0000"&gt;Cisco response&amp;nbsp;&lt;/FONT&gt;&lt;/U&gt;&lt;/EM&gt;&lt;BR /&gt;&amp;nbsp;- You are on a support forum populated by Cisco customers on a &lt;STRONG&gt;volunteering&lt;/STRONG&gt; basis. For official support and letting Cisco know your concerns you need to create a &lt;FONT color="#008000"&gt;&lt;U&gt;&lt;STRONG&gt;TAC case ,&amp;nbsp;&lt;/STRONG&gt;&lt;/U&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;M.&lt;/P&gt;</description>
      <pubDate>Tue, 30 Apr 2024 12:17:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-and-fmc-7-4-1-1-downgrades-ssh-to-9-1-now-more-vulnerable/m-p/5084241#M1111914</guid>
      <dc:creator>Mark Elsen</dc:creator>
      <dc:date>2024-04-30T12:17:26Z</dc:date>
    </item>
    <item>
      <title>Re: FTD and FMC 7.4.1.1 downgrades SSH to 9.1 - Now more vulnerable</title>
      <link>https://community.cisco.com/t5/network-security/ftd-and-fmc-7-4-1-1-downgrades-ssh-to-9-1-now-more-vulnerable/m-p/5084250#M1111916</link>
      <description>&lt;P&gt;Opening a TAC case was the first thing I did. I was wondering if anyone else is encountering this, and if they are, what are they doing. Anyone who has to meet any sort of compliance should be talking about this. It's odd that it's eerily quiet.&lt;/P&gt;</description>
      <pubDate>Tue, 30 Apr 2024 12:23:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-and-fmc-7-4-1-1-downgrades-ssh-to-9-1-now-more-vulnerable/m-p/5084250#M1111916</guid>
      <dc:creator>kbenedict1</dc:creator>
      <dc:date>2024-04-30T12:23:07Z</dc:date>
    </item>
    <item>
      <title>Re: FTD and FMC 7.4.1.1 downgrades SSH to 9.1 - Now more vulnerable</title>
      <link>https://community.cisco.com/t5/network-security/ftd-and-fmc-7-4-1-1-downgrades-ssh-to-9-1-now-more-vulnerable/m-p/5084281#M1111919</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;- I can follow you on those considerations and or perhaps others already having TAC cases launched and getting insights&amp;nbsp;&amp;nbsp;&lt;EM&gt;(sometimes....) ,&amp;nbsp;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;M.&lt;/P&gt;</description>
      <pubDate>Tue, 30 Apr 2024 12:34:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-and-fmc-7-4-1-1-downgrades-ssh-to-9-1-now-more-vulnerable/m-p/5084281#M1111919</guid>
      <dc:creator>Mark Elsen</dc:creator>
      <dc:date>2024-04-30T12:34:22Z</dc:date>
    </item>
    <item>
      <title>Re: FTD and FMC 7.4.1.1 downgrades SSH to 9.1 - Now more vulnerable</title>
      <link>https://community.cisco.com/t5/network-security/ftd-and-fmc-7-4-1-1-downgrades-ssh-to-9-1-now-more-vulnerable/m-p/5084318#M1111923</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; (-Added) :&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/STRONG&gt;&amp;nbsp;&lt;A href="https://sec.cloudapps.cisco.com/security/center/home.x#:" target="_blank"&gt;https://sec.cloudapps.cisco.com/security/center/home.x#:&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;M.&lt;/P&gt;</description>
      <pubDate>Tue, 30 Apr 2024 12:58:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-and-fmc-7-4-1-1-downgrades-ssh-to-9-1-now-more-vulnerable/m-p/5084318#M1111923</guid>
      <dc:creator>Mark Elsen</dc:creator>
      <dc:date>2024-04-30T12:58:43Z</dc:date>
    </item>
    <item>
      <title>Re: FTD and FMC 7.4.1.1 downgrades SSH to 9.1 - Now more vulnerable</title>
      <link>https://community.cisco.com/t5/network-security/ftd-and-fmc-7-4-1-1-downgrades-ssh-to-9-1-now-more-vulnerable/m-p/5084758#M1111940</link>
      <description>&lt;P&gt;My Firepower 7.2.5 reports OpenSSH 8.0.&lt;/P&gt;
&lt;P&gt;I scanned a 7.4.1.1 FMC and it reports 9.1 (as does a 7.6 beta FMC)&lt;/P&gt;
&lt;P&gt;What version did you see with something higher than 9.1?&lt;/P&gt;</description>
      <pubDate>Tue, 30 Apr 2024 19:10:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-and-fmc-7-4-1-1-downgrades-ssh-to-9-1-now-more-vulnerable/m-p/5084758#M1111940</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2024-04-30T19:10:31Z</dc:date>
    </item>
    <item>
      <title>Re: FTD and FMC 7.4.1.1 downgrades SSH to 9.1 - Now more vulnerable</title>
      <link>https://community.cisco.com/t5/network-security/ftd-and-fmc-7-4-1-1-downgrades-ssh-to-9-1-now-more-vulnerable/m-p/5084806#M1111942</link>
      <description>&lt;P&gt;Yes, it's 9.1 for 7.4.1.1. The problem is that the aforementioned CVEs are all about SSH versions less than 9.6. I understand that Cisco says they're not vulnerable, but many are, so I'm wondering why they think they're not.&lt;/P&gt;</description>
      <pubDate>Tue, 30 Apr 2024 19:21:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-and-fmc-7-4-1-1-downgrades-ssh-to-9-1-now-more-vulnerable/m-p/5084806#M1111942</guid>
      <dc:creator>kbenedict1</dc:creator>
      <dc:date>2024-04-30T19:21:06Z</dc:date>
    </item>
    <item>
      <title>Re: FTD and FMC 7.4.1.1 downgrades SSH to 9.1 - Now more vulnerable</title>
      <link>https://community.cisco.com/t5/network-security/ftd-and-fmc-7-4-1-1-downgrades-ssh-to-9-1-now-more-vulnerable/m-p/5085177#M1111949</link>
      <description>&lt;P&gt;It appears some FX-OS versions are affected and that Cisco has developed a fix internally that is not yet posted.&lt;/P&gt;
&lt;P&gt;The "Fixed release" build number can be a bit challenging to decipher but it appears 2.14.1.149 and higher have the fix (2.14.1.143 is the latest available on the downloads site as of today (1 May 2024).&lt;/P&gt;
&lt;P&gt;Reference: &lt;A href="https://bst.cisco.com/bugsearch/bug/CSCwi60430" target="_blank"&gt;https://bst.cisco.com/bugsearch/bug/CSCwi60430&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;I would cite that in your open TAC case. Please let us know what they say.&lt;/P&gt;
&lt;P&gt;I have yet to see where Cisco downgraded any previously included OpenSSH module present in any previously released FMC or FTD.&lt;/P&gt;</description>
      <pubDate>Wed, 01 May 2024 03:04:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-and-fmc-7-4-1-1-downgrades-ssh-to-9-1-now-more-vulnerable/m-p/5085177#M1111949</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2024-05-01T03:04:18Z</dc:date>
    </item>
  </channel>
</rss>

