<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic I can't say for sure as those in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/poodle-vulnerability-are-asa-5500-s-and-asa-sm-unaffected/m-p/2606159#M205754</link>
    <description>&lt;P&gt;I can't say for sure as those software versions aren't specifically named in the BugID for this vulnerability.&lt;/P&gt;&lt;P&gt;In any case, the workaround to mitigate it is simple enough so you you can just go ahead and deploy:&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: rgb(68, 68, 68); font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 15.9996004104614px;"&gt;ssl client-version tlsv1-only&lt;/SPAN&gt;&lt;BR style="color: rgb(68, 68, 68); font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 15.9996004104614px;" /&gt;&lt;SPAN style="color: rgb(68, 68, 68); font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 15.9996004104614px;"&gt;ssl server-version tlsv1&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: rgb(68, 68, 68); font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 15.9996004104614px;"&gt;There's no adverse impact to any other services on the system.&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 23 Oct 2014 20:04:02 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2014-10-23T20:04:02Z</dc:date>
    <item>
      <title>POODLE vulnerability - Are ASA 5500's and ASA SM unaffected?</title>
      <link>https://community.cisco.com/t5/network-security/poodle-vulnerability-are-asa-5500-s-and-asa-sm-unaffected/m-p/2606155#M205750</link>
      <description>&lt;P&gt;ASA evaluation of SSLv3 POODLE vulnerability at &lt;A href="https://tools.cisco.com/bugsearch/bug/CSCur23709" target="_blank"&gt;https://tools.cisco.com/bugsearch/bug/CSCur23709&lt;/A&gt; only mentions ASA 5500-X but not ASA 55xx appliances and ASA SM. Does this mean ASA 55xx appliances and ASA SM are not affected by the vulnerability?&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 04:57:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/poodle-vulnerability-are-asa-5500-s-and-asa-sm-unaffected/m-p/2606155#M205750</guid>
      <dc:creator>Nathan Kim</dc:creator>
      <dc:date>2019-03-12T04:57:59Z</dc:date>
    </item>
    <item>
      <title>They use the term "Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/poodle-vulnerability-are-asa-5500-s-and-asa-sm-unaffected/m-p/2606156#M205751</link>
      <description>&lt;P&gt;They use the term "&lt;SPAN style="color: rgb(68, 68, 68); font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 15.9996004104614px;"&gt;Cisco ASA 5500-X Series Next-Generation Firewalls&lt;/SPAN&gt;" in a generic sense. Given that the known affected versions include ASA 8.2, 8.3 and 8.4 software (which run on the legacy ASA 5500s), then I'd say yes it includes the ASA 5500 (non-X) series.&lt;/P&gt;&lt;P&gt;The actual &lt;A href="http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141015-poodle"&gt;security vulnerability announcement&lt;/A&gt; confirms that the vulnerability applies to the software - not necessarily the hardware platform per se.&lt;/P&gt;&lt;P&gt;Given that the ASA Service Module code base is based on the affected software (even though they are silent re 8.5&amp;nbsp;which you could be running on the ASA SM) I'd say it would be a good idea to mitigate that platform as well if you have it.&lt;/P&gt;</description>
      <pubDate>Tue, 21 Oct 2014 15:35:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/poodle-vulnerability-are-asa-5500-s-and-asa-sm-unaffected/m-p/2606156#M205751</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2014-10-21T15:35:29Z</dc:date>
    </item>
    <item>
      <title>Marvin,Thank you for your</title>
      <link>https://community.cisco.com/t5/network-security/poodle-vulnerability-are-asa-5500-s-and-asa-sm-unaffected/m-p/2606157#M205752</link>
      <description>&lt;P&gt;Marvin,&lt;/P&gt;&lt;P&gt;Thank you for your quick and insightful response.&lt;/P&gt;&lt;P&gt;I agree with your recommendations.&lt;/P&gt;&lt;P&gt;Nathan&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 21 Oct 2014 16:24:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/poodle-vulnerability-are-asa-5500-s-and-asa-sm-unaffected/m-p/2606157#M205752</guid>
      <dc:creator>Nathan Kim</dc:creator>
      <dc:date>2014-10-21T16:24:59Z</dc:date>
    </item>
    <item>
      <title>Hello,are these versions</title>
      <link>https://community.cisco.com/t5/network-security/poodle-vulnerability-are-asa-5500-s-and-asa-sm-unaffected/m-p/2606158#M205753</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;are these versions affected?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;asa&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 9.3(1)&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;asa&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;9.1(3)&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;fwsm&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 4.1(15)&lt;/P&gt;</description>
      <pubDate>Thu, 23 Oct 2014 19:58:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/poodle-vulnerability-are-asa-5500-s-and-asa-sm-unaffected/m-p/2606158#M205753</guid>
      <dc:creator>SteveStarnes2014</dc:creator>
      <dc:date>2014-10-23T19:58:17Z</dc:date>
    </item>
    <item>
      <title>I can't say for sure as those</title>
      <link>https://community.cisco.com/t5/network-security/poodle-vulnerability-are-asa-5500-s-and-asa-sm-unaffected/m-p/2606159#M205754</link>
      <description>&lt;P&gt;I can't say for sure as those software versions aren't specifically named in the BugID for this vulnerability.&lt;/P&gt;&lt;P&gt;In any case, the workaround to mitigate it is simple enough so you you can just go ahead and deploy:&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: rgb(68, 68, 68); font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 15.9996004104614px;"&gt;ssl client-version tlsv1-only&lt;/SPAN&gt;&lt;BR style="color: rgb(68, 68, 68); font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 15.9996004104614px;" /&gt;&lt;SPAN style="color: rgb(68, 68, 68); font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 15.9996004104614px;"&gt;ssl server-version tlsv1&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: rgb(68, 68, 68); font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 15.9996004104614px;"&gt;There's no adverse impact to any other services on the system.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 23 Oct 2014 20:04:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/poodle-vulnerability-are-asa-5500-s-and-asa-sm-unaffected/m-p/2606159#M205754</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2014-10-23T20:04:02Z</dc:date>
    </item>
    <item>
      <title>The work around happens to</title>
      <link>https://community.cisco.com/t5/network-security/poodle-vulnerability-are-asa-5500-s-and-asa-sm-unaffected/m-p/2606160#M205755</link>
      <description>&lt;P&gt;The work around happens to not be applicable for the version I'm running. &amp;nbsp;The vulnerability could affect&amp;nbsp;an ASA if "A block cipher in CBC mode is one of the transform sets being offered". &amp;nbsp;&lt;/P&gt;&lt;P&gt;How do I know if a&amp;nbsp;block cipher in CBC mode is one of the transform sets I have configured? &amp;nbsp;I cannot find any further details from Cisco regarding this.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;Jnomm&lt;/P&gt;</description>
      <pubDate>Thu, 23 Oct 2014 22:16:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/poodle-vulnerability-are-asa-5500-s-and-asa-sm-unaffected/m-p/2606160#M205755</guid>
      <dc:creator>jnommensen</dc:creator>
      <dc:date>2014-10-23T22:16:51Z</dc:date>
    </item>
    <item>
      <title>jnommensen,What version are</title>
      <link>https://community.cisco.com/t5/network-security/poodle-vulnerability-are-asa-5500-s-and-asa-sm-unaffected/m-p/2606161#M205756</link>
      <description>&lt;P&gt;jnommensen,&lt;/P&gt;&lt;P&gt;What version are you running on your ASA?&lt;/P&gt;&lt;P&gt;&lt;EM&gt;ssl client-version&lt;/EM&gt; and &lt;EM&gt;ssl server-version&lt;/EM&gt; were both introduced in 7.0(1) &amp;nbsp;quite some time ago...&lt;/P&gt;&lt;P&gt;The way I understand it...&amp;nbsp;&lt;/P&gt;&lt;P&gt;If your ASA acts as an https server for downloading AnyConnnect software to VPN Users, or if you use clientless VPN or ASDM &amp;nbsp; -and- &amp;nbsp;if you have &lt;EM&gt;ssl server-version&lt;/EM&gt; &lt;EM&gt;any&lt;/EM&gt; then you are at risk due to the clients browser negotiating down to SSLv3.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope this helps.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Tim&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 29 Oct 2014 20:00:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/poodle-vulnerability-are-asa-5500-s-and-asa-sm-unaffected/m-p/2606161#M205756</guid>
      <dc:creator>Tim Glen</dc:creator>
      <dc:date>2014-10-29T20:00:57Z</dc:date>
    </item>
    <item>
      <title>The list of fixed releases</title>
      <link>https://community.cisco.com/t5/network-security/poodle-vulnerability-are-asa-5500-s-and-asa-sm-unaffected/m-p/2606162#M205757</link>
      <description>&lt;P&gt;The list of fixed releases for bug CSCur23709&amp;nbsp;lists 9.0(4.201). When will it be generally available? I don't see it on the ASA5525 Interim Releases page.&lt;/P&gt;&lt;P&gt;Also, Bug&amp;nbsp;CSCur23709 refers to a fix for&amp;nbsp;CSCug51375 as being available for releases&amp;nbsp;9.1.2 and later but I can find no reference to it in any of the Interim Release notes.&lt;/P&gt;&lt;P&gt;Finally, there is no indication&amp;nbsp;of when&amp;nbsp;a fixed release might be available. Can you comment?&lt;/P&gt;</description>
      <pubDate>Mon, 03 Nov 2014 18:43:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/poodle-vulnerability-are-asa-5500-s-and-asa-sm-unaffected/m-p/2606162#M205757</guid>
      <dc:creator>tdargis</dc:creator>
      <dc:date>2014-11-03T18:43:13Z</dc:date>
    </item>
    <item>
      <title>Does anyone know if the CISCO</title>
      <link>https://community.cisco.com/t5/network-security/poodle-vulnerability-are-asa-5500-s-and-asa-sm-unaffected/m-p/2606163#M205758</link>
      <description>&lt;P&gt;Does anyone know if the CISCO ASA 9.1(5) is affected?. &amp;nbsp;Device Type: 5525.&lt;/P&gt;&lt;P&gt;Where do I get this information?.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;</description>
      <pubDate>Tue, 04 Nov 2014 22:07:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/poodle-vulnerability-are-asa-5500-s-and-asa-sm-unaffected/m-p/2606163#M205758</guid>
      <dc:creator>alexandrepacheco</dc:creator>
      <dc:date>2014-11-04T22:07:45Z</dc:date>
    </item>
    <item>
      <title>Yes, it is.Please refer t the</title>
      <link>https://community.cisco.com/t5/network-security/poodle-vulnerability-are-asa-5500-s-and-asa-sm-unaffected/m-p/2606164#M205759</link>
      <description>&lt;P&gt;Yes, it is.&lt;/P&gt;&lt;P&gt;Please refer t the link I provided earlier and, in that page, under affected products you can see a follow-on link to the actual BugID for the ASA (cisco.com login required).&lt;/P&gt;</description>
      <pubDate>Tue, 04 Nov 2014 23:09:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/poodle-vulnerability-are-asa-5500-s-and-asa-sm-unaffected/m-p/2606164#M205759</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2014-11-04T23:09:23Z</dc:date>
    </item>
    <item>
      <title>Are you sure?  I see nothing</title>
      <link>https://community.cisco.com/t5/network-security/poodle-vulnerability-are-asa-5500-s-and-asa-sm-unaffected/m-p/2606165#M205760</link>
      <description>&lt;P&gt;Are you sure?&amp;nbsp; I see nothing that indicates v9.1(5) is vulnerable, only v9.1(1).&amp;nbsp; Some clarity would be nice on this topic as earlier in this thread you agree that because 9.1(3) isn't mentioned you can't say for sure if it's vulnerable.&amp;nbsp; Then to the question of v9.1(5) you agree it is..&lt;/P&gt;</description>
      <pubDate>Wed, 05 Nov 2014 20:43:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/poodle-vulnerability-are-asa-5500-s-and-asa-sm-unaffected/m-p/2606165#M205760</guid>
      <dc:creator>chmossyyz</dc:creator>
      <dc:date>2014-11-05T20:43:04Z</dc:date>
    </item>
    <item>
      <title>Cisco has updated the BugID</title>
      <link>https://community.cisco.com/t5/network-security/poodle-vulnerability-are-asa-5500-s-and-asa-sm-unaffected/m-p/2606166#M205761</link>
      <description>&lt;P&gt;Cisco has updated the BugID&amp;nbsp;since my original posting to indicate the ASA vulnerability applies to "&lt;SPAN style="color: rgb(68, 68, 68); font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 15.9996004104614px;"&gt;&amp;nbsp;9.1.2 &lt;STRONG&gt;and later&lt;/STRONG&gt;&lt;/SPAN&gt;".&lt;/P&gt;&lt;P&gt;&lt;A href="https://tools.cisco.com/bugsearch/bug/CSCur23709"&gt;Reference&lt;/A&gt;.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 06 Nov 2014 16:18:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/poodle-vulnerability-are-asa-5500-s-and-asa-sm-unaffected/m-p/2606166#M205761</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2014-11-06T16:18:15Z</dc:date>
    </item>
    <item>
      <title>Yep, I had opened a ticket</title>
      <link>https://community.cisco.com/t5/network-security/poodle-vulnerability-are-asa-5500-s-and-asa-sm-unaffected/m-p/2606167#M205762</link>
      <description>&lt;P&gt;Yep, I had opened a ticket last night specifically mentioning the advisory and received confirmation.&amp;nbsp; Glad they updated the article! &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;"Yes, the ASA version 9.1.5 is vulnerable. The fixed release is ASA version 9.2(2.103) and 9.3(1.1). So any versions before these versions are vulnerable."&lt;/P&gt;</description>
      <pubDate>Thu, 06 Nov 2014 16:21:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/poodle-vulnerability-are-asa-5500-s-and-asa-sm-unaffected/m-p/2606167#M205762</guid>
      <dc:creator>chmossyyz</dc:creator>
      <dc:date>2014-11-06T16:21:40Z</dc:date>
    </item>
    <item>
      <title>Hello. I have these 2</title>
      <link>https://community.cisco.com/t5/network-security/poodle-vulnerability-are-asa-5500-s-and-asa-sm-unaffected/m-p/2606168#M205763</link>
      <description>&lt;P&gt;Hello. I have these 2 &amp;nbsp;commands running&lt;/P&gt;&lt;P&gt;ssl server-version tlsv1-only&lt;BR /&gt;ssl client-version tlsv1-only&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But when I run this tool&amp;nbsp;https://www.ssllabs.com the vulnerability still there...&lt;/P&gt;&lt;P&gt;Cisco ASA 5520 9.0(1)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Wed, 12 Nov 2014 16:23:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/poodle-vulnerability-are-asa-5500-s-and-asa-sm-unaffected/m-p/2606168#M205763</guid>
      <dc:creator>gnazer</dc:creator>
      <dc:date>2014-11-12T16:23:49Z</dc:date>
    </item>
  </channel>
</rss>

