<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco ASA Security Hardening in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-asa-security-hardening/m-p/5121975#M1113190</link>
    <description>&lt;P&gt;&lt;SPAN&gt;Thank you for your response. Prior to posting my question to the community, I managed to find the relevant link and discovered that upgrading will resolve my issue. I will proceed with the upgrade, but as it may take some time, I am interested in exploring any alternative workarounds that could be suitable in the meantime&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 31 May 2024 13:19:43 GMT</pubDate>
    <dc:creator>michaelgebreegziabher21778</dc:creator>
    <dc:date>2024-05-31T13:19:43Z</dc:date>
    <item>
      <title>Cisco ASA Security Hardening</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-security-hardening/m-p/5121812#M1113181</link>
      <description>&lt;P&gt;&lt;SPAN&gt;While investigating vulnerabilities, I discovered some vulnerabilities on Cisco FTD's known as "Cisco Adaptive Security Appliance Remote Code Execution and Denial of Service Vulnerability (cisco-sa-20180129-asa1)". I'm looking for any possible solutions or workarounds to address these vulnerabilities.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 31 May 2024 10:45:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-security-hardening/m-p/5121812#M1113181</guid>
      <dc:creator>michaelgebreegziabher21778</dc:creator>
      <dc:date>2024-05-31T10:45:58Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA Security Hardening</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-security-hardening/m-p/5121837#M1113182</link>
      <description>&lt;P&gt;&lt;A href="https://www.cisco.com/c/dam/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/200150-Hardening-Cisco-ASA-Firewall.pdf" target="_blank"&gt;https://www.cisco.com/c/dam/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/200150-Hardening-Cisco-ASA-Firewall.pdf&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;check this&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Fri, 31 May 2024 11:10:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-security-hardening/m-p/5121837#M1113182</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-05-31T11:10:10Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA Security Hardening</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-security-hardening/m-p/5121872#M1113184</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1071912"&gt;@michaelgebreegziabher21778&lt;/a&gt; what vulnerabilites do you refer to? You should be able find the CVE and search for the Cisco Security Advisory &lt;A href="https://sec.cloudapps.cisco.com/security/center/publicationListing.x" target="_blank"&gt;https://sec.cloudapps.cisco.com/security/center/publicationListing.x&lt;/A&gt; which should tell you the fix, probably upgtading to the latest version.&lt;/P&gt;</description>
      <pubDate>Fri, 31 May 2024 11:36:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-security-hardening/m-p/5121872#M1113184</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2024-05-31T11:36:40Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA Security Hardening</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-security-hardening/m-p/5121919#M1113187</link>
      <description>&lt;P&gt;If you do a simple search (google etc.) you should see one of the first results being this document:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/csa/cisco-sa-20180129-asa1.html" target="_blank" rel="noopener"&gt;https://www.cisco.com/c/en/us/support/docs/csa/cisco-sa-20180129-asa1.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;If contains the fixed software versions for both ASA and FTD software. Upgrade to one of those releases (or later) and you will no longer have that vulnerability in your firewall(s).&lt;/P&gt;</description>
      <pubDate>Fri, 31 May 2024 13:08:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-security-hardening/m-p/5121919#M1113187</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2024-05-31T13:08:18Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA Security Hardening</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-security-hardening/m-p/5121975#M1113190</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Thank you for your response. Prior to posting my question to the community, I managed to find the relevant link and discovered that upgrading will resolve my issue. I will proceed with the upgrade, but as it may take some time, I am interested in exploring any alternative workarounds that could be suitable in the meantime&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 31 May 2024 13:19:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-security-hardening/m-p/5121975#M1113190</guid>
      <dc:creator>michaelgebreegziabher21778</dc:creator>
      <dc:date>2024-05-31T13:19:43Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA Security Hardening</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-security-hardening/m-p/5122015#M1113191</link>
      <description>&lt;P&gt;As noted in the Cisco published document:&lt;/P&gt;
&lt;P&gt;"Cisco has released software updates that address this vulnerability. There are no workarounds that address all the features that are affected by this vulnerability."&lt;/P&gt;
&lt;P&gt;As long as you have remote access VPN enabled and are running a software release prior to the ones recommended to fix the issue, you are subject to the vulnerability.&lt;/P&gt;</description>
      <pubDate>Fri, 31 May 2024 13:30:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-security-hardening/m-p/5122015#M1113191</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2024-05-31T13:30:04Z</dc:date>
    </item>
  </channel>
</rss>

