<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: TLS  Session Renegotiation Vulnerability in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/tls-session-renegotiation-vulnerability/m-p/3731824#M343474</link>
    <description>&lt;P&gt;I believe the CVE is CVE-2009-3555&lt;/P&gt;</description>
    <pubDate>Wed, 24 Oct 2018 15:44:40 GMT</pubDate>
    <dc:creator>mersnetadmin</dc:creator>
    <dc:date>2018-10-24T15:44:40Z</dc:date>
    <item>
      <title>TLS  Session Renegotiation Vulnerability</title>
      <link>https://community.cisco.com/t5/network-security/tls-session-renegotiation-vulnerability/m-p/2313961#M343470</link>
      <description>&lt;P&gt;Hi Team,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We are trying to scan the ASA firewall and getting the below error. Is there any way to resolve this issue? Please sugget.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We did a security scan of Internal firewall and found one issue - "TLS &lt;/P&gt;&lt;P&gt;Session Renegotiation Vulnerability"&lt;/P&gt;&lt;P&gt;&lt;BR style="font-family: verdana, geneva, lucida, 'lucida grande', arial, helvetica, sans-serif; font-size: 14px; background-color: #ffffff;" /&gt;&lt;/P&gt;&lt;P&gt;The TLS protocol, and the SSL protocol 3.0 and possibly earlier, does &lt;/P&gt;&lt;P&gt;not properly associate renegotiation handshakes with an existing &lt;/P&gt;&lt;P&gt;connection, which allows man-in-the-middle attackers to insert data into &lt;/P&gt;&lt;P&gt;HTTPS sessions, and possibly other types of sessions protected by TLS or &lt;/P&gt;&lt;P&gt;SSL, by sending an unauthenticated request that is processed &lt;/P&gt;&lt;P&gt;retroactively by a server in a post-renegotiation context, related to a &lt;/P&gt;&lt;P&gt;"plaintext injection" attack&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 02:34:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tls-session-renegotiation-vulnerability/m-p/2313961#M343470</guid>
      <dc:creator>Krishna Kumar konduri</dc:creator>
      <dc:date>2019-03-12T02:34:29Z</dc:date>
    </item>
    <item>
      <title>TLS  Session Renegotiation Vulnerability</title>
      <link>https://community.cisco.com/t5/network-security/tls-session-renegotiation-vulnerability/m-p/2313962#M343473</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It would be easier to search for a solution if theres a CVE ID available.&lt;/P&gt;&lt;P&gt;Perhaps it's solved with Interim 9.1.2?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Michael &lt;BR /&gt; &lt;BR /&gt;Please rate all helpful posts&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Sep 2013 13:08:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tls-session-renegotiation-vulnerability/m-p/2313962#M343473</guid>
      <dc:creator>Michael Muenz</dc:creator>
      <dc:date>2013-09-06T13:08:04Z</dc:date>
    </item>
    <item>
      <title>Re: TLS  Session Renegotiation Vulnerability</title>
      <link>https://community.cisco.com/t5/network-security/tls-session-renegotiation-vulnerability/m-p/3731824#M343474</link>
      <description>&lt;P&gt;I believe the CVE is CVE-2009-3555&lt;/P&gt;</description>
      <pubDate>Wed, 24 Oct 2018 15:44:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tls-session-renegotiation-vulnerability/m-p/3731824#M343474</guid>
      <dc:creator>mersnetadmin</dc:creator>
      <dc:date>2018-10-24T15:44:40Z</dc:date>
    </item>
  </channel>
</rss>

