<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi Nikko Malabanan in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-vulnerability-test/m-p/2699367#M415782</link>
    <description>&lt;PRE&gt;
Hi &lt;A about="/users/nikkomalabanan" class="username" datatype="" href="https://supportforums.cisco.com/users/nikkomalabanan" property="foaf:name" title="View user profile." typeof="sioc:UserAccount" lang=""&gt;Nikko Malabanan&lt;/A&gt;

This vulnerability is only for routers and switches. The ASA firewall
platform is not affected.
 
Please check the following URL's for further reference:
 
TCP Vulnerabilities in Multiple IOS-Based Cisco Products:-
 
&lt;A href="http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20040420-tcp-ios" target="_blank"&gt;http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20040420-tcp-ios&lt;/A&gt;

&lt;A href="http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20040420-tcp-nonios" target="_blank"&gt;http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20040420-tcp-nonios&lt;/A&gt;

Multiple Vulnerabilities in Cisco PIX and Cisco ASA:-
 &lt;A href="http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20080604-asa" target="_blank"&gt;http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20080604-asa&lt;/A&gt;

&lt;/PRE&gt;

&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hope it helps&lt;/P&gt;
&lt;P&gt;-Randy-&lt;/P&gt;</description>
    <pubDate>Sun, 14 Jun 2015 22:56:49 GMT</pubDate>
    <dc:creator>rvarelac</dc:creator>
    <dc:date>2015-06-14T22:56:49Z</dc:date>
    <item>
      <title>ASA Vulnerability Test</title>
      <link>https://community.cisco.com/t5/network-security/asa-vulnerability-test/m-p/2699366#M415779</link>
      <description>&lt;P&gt;Hi Experts,&lt;/P&gt;&lt;P&gt;Good Day!&lt;/P&gt;&lt;P&gt;I would like to seek for your assistance how to mitigate some vulnerabilities in my ASA with CX. I perform vulnerability test using Qualys into my ASA with CX and it hit me with a vulnerability named "TCP Sequence Number Approximation Based on Denial-of-Service". I did some research and I found out that most of the time BGP is prone to this vulnerability but my ASA is not running BGP protocol however, my ASA is just a pass-through for BGP peering of the Catalysts. Is that the reason why my Qualys detected it?&lt;/P&gt;&lt;P&gt;The thing is based on the documentation of this vulnerability, as a workaround I configured MD5 authentication for BGP peering in my switches and I ran again a VA scan and still the vulnerability is still there. I read thoroughly the vulnerability document and besides from the BGP protocol, Window Scaling is also part of this vulnerability which I configured for me to enhanced throughput.&lt;/P&gt;&lt;P&gt;Please help if one of you knows Qualys and how to mitigate this vulnerability.&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Niks&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 13:30:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-vulnerability-test/m-p/2699366#M415779</guid>
      <dc:creator>fatalXerror</dc:creator>
      <dc:date>2020-02-21T13:30:06Z</dc:date>
    </item>
    <item>
      <title>Hi Nikko Malabanan</title>
      <link>https://community.cisco.com/t5/network-security/asa-vulnerability-test/m-p/2699367#M415782</link>
      <description>&lt;PRE&gt;
Hi &lt;A about="/users/nikkomalabanan" class="username" datatype="" href="https://supportforums.cisco.com/users/nikkomalabanan" property="foaf:name" title="View user profile." typeof="sioc:UserAccount" lang=""&gt;Nikko Malabanan&lt;/A&gt;

This vulnerability is only for routers and switches. The ASA firewall
platform is not affected.
 
Please check the following URL's for further reference:
 
TCP Vulnerabilities in Multiple IOS-Based Cisco Products:-
 
&lt;A href="http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20040420-tcp-ios" target="_blank"&gt;http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20040420-tcp-ios&lt;/A&gt;

&lt;A href="http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20040420-tcp-nonios" target="_blank"&gt;http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20040420-tcp-nonios&lt;/A&gt;

Multiple Vulnerabilities in Cisco PIX and Cisco ASA:-
 &lt;A href="http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20080604-asa" target="_blank"&gt;http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20080604-asa&lt;/A&gt;

&lt;/PRE&gt;

&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hope it helps&lt;/P&gt;
&lt;P&gt;-Randy-&lt;/P&gt;</description>
      <pubDate>Sun, 14 Jun 2015 22:56:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-vulnerability-test/m-p/2699367#M415782</guid>
      <dc:creator>rvarelac</dc:creator>
      <dc:date>2015-06-14T22:56:49Z</dc:date>
    </item>
  </channel>
</rss>

