<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic CVE-2016-1287 Vulnerability in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cve-2016-1287-vulnerability/m-p/2915461#M159043</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;We have detected the next vulnerability CVE-2016-1287 and Cisco advice upgrade to 9.1 version, but in my case would be so painful (current version still is the 8.2). Whereas, anybody knows if there is any workaround?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks in advance,&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 07:24:29 GMT</pubDate>
    <dc:creator>alfredobosca</dc:creator>
    <dc:date>2019-03-12T07:24:29Z</dc:date>
    <item>
      <title>CVE-2016-1287 Vulnerability</title>
      <link>https://community.cisco.com/t5/network-security/cve-2016-1287-vulnerability/m-p/2915461#M159043</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;We have detected the next vulnerability CVE-2016-1287 and Cisco advice upgrade to 9.1 version, but in my case would be so painful (current version still is the 8.2). Whereas, anybody knows if there is any workaround?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks in advance,&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 07:24:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cve-2016-1287-vulnerability/m-p/2915461#M159043</guid>
      <dc:creator>alfredobosca</dc:creator>
      <dc:date>2019-03-12T07:24:29Z</dc:date>
    </item>
    <item>
      <title>Hello,</title>
      <link>https://community.cisco.com/t5/network-security/cve-2016-1287-vulnerability/m-p/2915462#M159044</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;referring to&lt;/P&gt;
&lt;P&gt;&lt;A href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160210-asa-ike"&gt;https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160210-asa-ike&amp;nbsp;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Section Workarounds states that there are currently no workarounds.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;</description>
      <pubDate>Fri, 26 Feb 2016 16:22:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cve-2016-1287-vulnerability/m-p/2915462#M159044</guid>
      <dc:creator>benjamin.rickert11</dc:creator>
      <dc:date>2016-02-26T16:22:16Z</dc:date>
    </item>
    <item>
      <title>Hello Alfredo,</title>
      <link>https://community.cisco.com/t5/network-security/cve-2016-1287-vulnerability/m-p/2915463#M159045</link>
      <description>&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;Hello Alfredo,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;There not workarounds either ways, you may just patch the firewalls to the interim version &lt;STRONG&gt;8.2(5)59&lt;/STRONG&gt;, and it will stay in the same &lt;STRONG&gt;8.2.X&lt;/STRONG&gt; series, so your NAT or VPN configs wont change, either ways the best practice is to move to &lt;STRONG&gt;9.1.7,&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;If this helped, could you please rate this! let me know if you have further questions on this!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;Regards,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;David Castro,&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 28 Feb 2016 06:39:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cve-2016-1287-vulnerability/m-p/2915463#M159045</guid>
      <dc:creator>David Castro F.</dc:creator>
      <dc:date>2016-02-28T06:39:51Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/cve-2016-1287-vulnerability/m-p/2915464#M159046</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;But the version 8.2(5.59) still not available on cisco website.&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;</description>
      <pubDate>Sun, 28 Feb 2016 11:40:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cve-2016-1287-vulnerability/m-p/2915464#M159046</guid>
      <dc:creator>alfredobosca</dc:creator>
      <dc:date>2016-02-28T11:40:36Z</dc:date>
    </item>
    <item>
      <title>Hello Alfredo,</title>
      <link>https://community.cisco.com/t5/network-security/cve-2016-1287-vulnerability/m-p/2915465#M159047</link>
      <description>&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;Hello Alfredo,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;Version 8.2(5)59 is available, I actually patched 3 clusters with that interim release yesterday, the image is called&amp;nbsp;&lt;STRONG&gt;asa825-59-k8.bin, &lt;/STRONG&gt;and you may find it here:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;&lt;STRONG id="93B915C2F3D86476C6C4DC90EB825AEF30A29A00" class="overlay_img"&gt;Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and ASA5550. Please read the Release Note prior to downloading this release.&lt;/STRONG&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;- https://software.cisco.com/download/release.html?mdfid=279916854&amp;amp;flowid=4373&amp;amp;softwareid=280775065&amp;amp;release=8.2.5%20Interim&amp;amp;relind=AVAILABLE&amp;amp;rellifecycle=&amp;amp;reltype=latest&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;If this helped, could you please rate this! let me know if you have further questions on this!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;Regards,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;David Castro,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 28 Feb 2016 18:03:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cve-2016-1287-vulnerability/m-p/2915465#M159047</guid>
      <dc:creator>David Castro F.</dc:creator>
      <dc:date>2016-02-28T18:03:34Z</dc:date>
    </item>
    <item>
      <title>Hello,</title>
      <link>https://community.cisco.com/t5/network-security/cve-2016-1287-vulnerability/m-p/2915466#M159048</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I have upgrade from 8.2.5 to &lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;8.2(5)59&lt;/SPAN&gt; and all interfaces has been put on shutdown. This behaviour is unusual...&lt;/P&gt;
&lt;P&gt;&lt;IMG src="https://community.cisco.com/legacyfs/online/media/asa_8.2.5.59.jpg" class="migrated-markup-image" /&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 03 Mar 2016 10:54:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cve-2016-1287-vulnerability/m-p/2915466#M159048</guid>
      <dc:creator>alfredobosca</dc:creator>
      <dc:date>2016-03-03T10:54:58Z</dc:date>
    </item>
    <item>
      <title>Hello Alfredo,</title>
      <link>https://community.cisco.com/t5/network-security/cve-2016-1287-vulnerability/m-p/2915467#M159049</link>
      <description>&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;Hello Alfredo,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;It seems like nothing was saved, since there is not IP address, security level defined.. did you save the configuration before going towards that version? this is really unlikely to happen, and I was going through internal documentation and this seems to be an issue that is completely undocumented, since this was tested in several sandbox environments, is that ASA good of memory? did you do a health check when this occurred? by any chance do you have any syslog server, so we can see what happened at that accurate time? is that the only issue that you are having so far?&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;Note: An interface will show as shutdown if there are not devices connected to them, so check cabling and that there are devices plugged in and turned on.&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;Please proceed to rate and mark as correct this post if it helped you! Keep me posted!&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;Thanks,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;David Castro,&lt;/SPAN&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 03 Mar 2016 13:46:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cve-2016-1287-vulnerability/m-p/2915467#M159049</guid>
      <dc:creator>David Castro F.</dc:creator>
      <dc:date>2016-03-03T13:46:45Z</dc:date>
    </item>
    <item>
      <title>Hello,</title>
      <link>https://community.cisco.com/t5/network-security/cve-2016-1287-vulnerability/m-p/2915468#M159050</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;On the release note indicates that only affects to asa devices with HTTPS inspection. On this case the asa there isn't configured the HTTPS inspection. Should you upgrade the firmware?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks a lot!&lt;/P&gt;</description>
      <pubDate>Thu, 10 Mar 2016 14:29:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cve-2016-1287-vulnerability/m-p/2915468#M159050</guid>
      <dc:creator>alfredobosca</dc:creator>
      <dc:date>2016-03-10T14:29:12Z</dc:date>
    </item>
    <item>
      <title>according to the release</title>
      <link>https://community.cisco.com/t5/network-security/cve-2016-1287-vulnerability/m-p/2915469#M159051</link>
      <description>&lt;P&gt;according to the release notes of this last interim version, there wont be any other 8.2.X, so the recommended is to have the OS upgraded to 9.X, if this does not involve any memory implications, so for a best practice, you should look forward to upgrade, and make sure the 9.x wont wreck anything in place,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN&gt;Please proceed to rate and mark as correct this post if it helped you! Keep me posted!&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Thanks,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;David Castro,&lt;/SPAN&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 10 Mar 2016 22:48:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cve-2016-1287-vulnerability/m-p/2915469#M159051</guid>
      <dc:creator>David Castro F.</dc:creator>
      <dc:date>2016-03-10T22:48:36Z</dc:date>
    </item>
  </channel>
</rss>

