<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic 7.21 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cve-2016-1287-workaround/m-p/2835582#M159606</link>
    <description>&lt;DIV class="tblScroller"&gt;
&lt;TABLE cellspacing="0" cellpadding="6" border="3" width="500"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD&gt;7.2&lt;SUP&gt;1&lt;/SUP&gt; &lt;/TD&gt;
&lt;TD&gt;Affected; migrate to 9.1(7) or later&amp;nbsp;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;8.2&lt;SUP&gt;1&lt;/SUP&gt;&lt;/TD&gt;
&lt;TD&gt;Affected; migrate to 9.1(7) or later&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;8.3&lt;SUP&gt;1&lt;/SUP&gt; &lt;/TD&gt;
&lt;TD&gt;Affected; migrate to 9.1(7) or later&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;8.4&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;8.4(7.30)&amp;nbsp;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;8.5&lt;SUP&gt;1&lt;/SUP&gt; &lt;/TD&gt;
&lt;TD&gt;Not affected&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;8.6&lt;SUP&gt;1&lt;/SUP&gt; &lt;/TD&gt;
&lt;TD&gt;Affected; migrate to 9.1(7) or later&amp;nbsp;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;8.7&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;8.7(1.18)&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;9.0 &lt;/TD&gt;
&lt;TD&gt;9.0(4.38)&amp;nbsp;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;9.1&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;9.1(7)&amp;nbsp;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;9.2&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;9.2(4.5)&amp;nbsp;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;9.3&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;9.3(3.7)&amp;nbsp;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;9.4&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;9.4(2.4)&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;9.5 &lt;/TD&gt;
&lt;TD&gt;9.5(2.2) &lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Am I right thinking that 8.0 version is not affected?&lt;/P&gt;
&lt;/DIV&gt;
&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 16 Feb 2016 06:22:14 GMT</pubDate>
    <dc:creator>Ahmed Ahmedzadeh</dc:creator>
    <dc:date>2016-02-16T06:22:14Z</dc:date>
    <item>
      <title>CVE-2016-1287 workaround</title>
      <link>https://community.cisco.com/t5/network-security/cve-2016-1287-workaround/m-p/2835579#M159603</link>
      <description>&lt;P&gt;Hi everyone,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Just wondering if I could tackle this vuln using an ACL allowing only IKE1/2 traffic for selected VPN peers.&lt;/P&gt;
&lt;P&gt;Would that block any UDP crafted packets from getting through the ASA ipsec engine?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Awaiting your comments,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Theo.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 07:17:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cve-2016-1287-workaround/m-p/2835579#M159603</guid>
      <dc:creator>Theodore Anastassiou</dc:creator>
      <dc:date>2019-03-12T07:17:46Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/cve-2016-1287-workaround/m-p/2835580#M159604</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;Check this link...&lt;/P&gt;
&lt;P&gt;http://info.stack8.com/blog/cisco-cve-2016-1287-network-vulnerability-and-mitigation&lt;/P&gt;
&lt;P&gt;However, not sure if this works. Upgrade ASA to fixed version is the recommended solution.&lt;/P&gt;
&lt;P&gt;hth&lt;/P&gt;
&lt;P&gt;MS&lt;/P&gt;</description>
      <pubDate>Sun, 14 Feb 2016 04:22:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cve-2016-1287-workaround/m-p/2835580#M159604</guid>
      <dc:creator>mvsheik123</dc:creator>
      <dc:date>2016-02-14T04:22:44Z</dc:date>
    </item>
    <item>
      <title>Hi Theodore,</title>
      <link>https://community.cisco.com/t5/network-security/cve-2016-1287-workaround/m-p/2835581#M159605</link>
      <description>&lt;P&gt;Hi Theodore,&lt;/P&gt;
&lt;P&gt;Using Control plane ACL would reduce the likelihood if you use L2L VPN and if you use remote access VPN then control plane acl wont help. You can use&amp;nbsp;&lt;SPAN&gt;Cisco IPS Signature 7169-0 and Snort ID: 36903 which can detect attempts to exploit this vulnerability though you can upgrade to the below mentioned ASA releases to mitigate this vulnerability:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160210-asa-ike" title="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160210-asa-ike"&gt;https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160210-asa-ike&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;BR /&gt;Dinesh Moudgil&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;P.S. Please rate helpful posts.&lt;/P&gt;</description>
      <pubDate>Sun, 14 Feb 2016 07:10:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cve-2016-1287-workaround/m-p/2835581#M159605</guid>
      <dc:creator>Dinesh Moudgil</dc:creator>
      <dc:date>2016-02-14T07:10:37Z</dc:date>
    </item>
    <item>
      <title>7.21</title>
      <link>https://community.cisco.com/t5/network-security/cve-2016-1287-workaround/m-p/2835582#M159606</link>
      <description>&lt;DIV class="tblScroller"&gt;
&lt;TABLE cellspacing="0" cellpadding="6" border="3" width="500"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD&gt;7.2&lt;SUP&gt;1&lt;/SUP&gt; &lt;/TD&gt;
&lt;TD&gt;Affected; migrate to 9.1(7) or later&amp;nbsp;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;8.2&lt;SUP&gt;1&lt;/SUP&gt;&lt;/TD&gt;
&lt;TD&gt;Affected; migrate to 9.1(7) or later&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;8.3&lt;SUP&gt;1&lt;/SUP&gt; &lt;/TD&gt;
&lt;TD&gt;Affected; migrate to 9.1(7) or later&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;8.4&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;8.4(7.30)&amp;nbsp;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;8.5&lt;SUP&gt;1&lt;/SUP&gt; &lt;/TD&gt;
&lt;TD&gt;Not affected&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;8.6&lt;SUP&gt;1&lt;/SUP&gt; &lt;/TD&gt;
&lt;TD&gt;Affected; migrate to 9.1(7) or later&amp;nbsp;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;8.7&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;8.7(1.18)&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;9.0 &lt;/TD&gt;
&lt;TD&gt;9.0(4.38)&amp;nbsp;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;9.1&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;9.1(7)&amp;nbsp;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;9.2&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;9.2(4.5)&amp;nbsp;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;9.3&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;9.3(3.7)&amp;nbsp;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;9.4&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;9.4(2.4)&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;9.5 &lt;/TD&gt;
&lt;TD&gt;9.5(2.2) &lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Am I right thinking that 8.0 version is not affected?&lt;/P&gt;
&lt;/DIV&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 16 Feb 2016 06:22:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cve-2016-1287-workaround/m-p/2835582#M159606</guid>
      <dc:creator>Ahmed Ahmedzadeh</dc:creator>
      <dc:date>2016-02-16T06:22:14Z</dc:date>
    </item>
    <item>
      <title>A control-plane ACL will</title>
      <link>https://community.cisco.com/t5/network-security/cve-2016-1287-workaround/m-p/2835583#M159607</link>
      <description>&lt;P&gt;A control-plane ACL will block a lot of potential future mischief and is an excellent idea in general.&amp;nbsp; Unfortunately for cve-2016-1287, the bug is in the fragment processing, which presumably happens &lt;STRONG&gt;before&lt;/STRONG&gt; the ACL kicks in.&amp;nbsp; My best guess is that you can't mitigate this particular bug that way.&amp;nbsp; The only solution is to reload on fixed firmware.&lt;/P&gt;
&lt;P&gt;-- Jim Leinweber, WI State Lab of Hygiene&lt;/P&gt;</description>
      <pubDate>Fri, 19 Feb 2016 18:08:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cve-2016-1287-workaround/m-p/2835583#M159607</guid>
      <dc:creator>James Leinweber</dc:creator>
      <dc:date>2016-02-19T18:08:58Z</dc:date>
    </item>
  </channel>
</rss>

