<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Repeated ASA 5510 failed vulnerability scan (OpenSSL error) in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/repeated-asa-5510-failed-vulnerability-scan-openssl-error/m-p/1653839#M559252</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Mike,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I seem to be having the same issue and I followed your bug and notice the bug says it has been fixed in version 8.2 (5).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have an ASA 5520 and running Cisco Adaptive Security Appliance Software Version 8.2(5)2 and we conducted a Pen test recently and the company picked this error, see my thread below.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.cisco.com/thread/2206441?tstart=0"&gt;https://supportforums.cisco.com/thread/2206441?tstart=0&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;- Zubair&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 20 Mar 2013 12:45:19 GMT</pubDate>
    <dc:creator>Zubair.Sayed_2</dc:creator>
    <dc:date>2013-03-20T12:45:19Z</dc:date>
    <item>
      <title>Repeated ASA 5510 failed vulnerability scan (OpenSSL error)</title>
      <link>https://community.cisco.com/t5/network-security/repeated-asa-5510-failed-vulnerability-scan-openssl-error/m-p/1653837#M559250</link>
      <description>&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;We are getting vulnerability scanned by a PCI company and keep getting failures that state "OpenSSL SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG".&amp;nbsp; I've opened two TAC cases and TAC said that this vulnerability was addressed several versions back (we're currently running version 8.2.2 on our 5510 ASA).&amp;nbsp; TAC made several small changes to attempt to address this issue but we keep failing with the same message.&amp;nbsp; Has anyone ever failed their scan with this error and if so, what did you do to address this error?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;Here is the detailed error:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style=": ; font-size: 8pt; font-family: Arial; "&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P align="left"&gt;&lt;SPAN style="font-size: 12pt;"&gt;OpenSSL SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG&lt;/SPAN&gt;&lt;/P&gt;&lt;P align="left"&gt;&lt;SPAN style="font-size: 12pt;"&gt;Ciphersuite Change Issue&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: Arial; "&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P align="left"&gt;&lt;SPAN style="font-size: 12pt;"&gt;Synopsis :&lt;/SPAN&gt;&lt;/P&gt;&lt;P align="left"&gt;&lt;SPAN style="font-size: 12pt;"&gt;The remote host allows resuming SSL sessions.&lt;/SPAN&gt;&lt;/P&gt;&lt;P align="left"&gt;&lt;SPAN style="font-size: 12pt;"&gt;Description :&lt;/SPAN&gt;&lt;/P&gt;&lt;P align="left"&gt;&lt;SPAN style="font-size: 12pt;"&gt;The version of OpenSSL on the remote host has been shown to allow&lt;/SPAN&gt;&lt;/P&gt;&lt;P align="left"&gt;&lt;SPAN style="font-size: 12pt;"&gt;resuming session with a different cipher than was used when the&lt;/SPAN&gt;&lt;/P&gt;&lt;P align="left"&gt;&lt;SPAN style="font-size: 12pt;"&gt;session was initiated. This means that an attacker that sees (e.g.&lt;/SPAN&gt;&lt;/P&gt;&lt;P align="left"&gt;&lt;SPAN style="font-size: 12pt;"&gt;by sniffing) the start of an SSL connection can manipulate the OpenSSL&lt;/SPAN&gt;&lt;/P&gt;&lt;P align="left"&gt;&lt;SPAN style="font-size: 12pt;"&gt;session cache to cause subsequent resumes of that session to use a&lt;/SPAN&gt;&lt;/P&gt;&lt;P align="left"&gt;&lt;SPAN style="font-size: 12pt;"&gt;cipher chosen by the attacker.&lt;/SPAN&gt;&lt;/P&gt;&lt;P align="left"&gt;&lt;SPAN style="font-size: 12pt;"&gt;See also :&lt;/SPAN&gt;&lt;/P&gt;&lt;P align="left"&gt;&lt;SPAN style="font-size: 12pt;"&gt;&lt;A class="jive-link-external-small" href="http://openssl.org/news/secadv_20101202.txt" target="_blank"&gt;http://openssl.org/news/secadv_20101202.txt&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P align="left"&gt;&lt;SPAN style="font-size: 12pt;"&gt;Solution :&lt;/SPAN&gt;&lt;/P&gt;&lt;P align="left"&gt;&lt;SPAN style="font-size: 12pt;"&gt;Upgrade to OpenSSL 0.9.8q / 1.0.0.c or later.&lt;/SPAN&gt;&lt;/P&gt;&lt;P align="left"&gt;&lt;SPAN style="font-size: 12pt;"&gt;Risk factor :&lt;/SPAN&gt;&lt;/P&gt;&lt;P align="left"&gt;&lt;SPAN style="font-size: 12pt;"&gt;Medium / CVSS Base Score : 4.3&lt;/SPAN&gt;&lt;/P&gt;&lt;P align="left"&gt;&lt;SPAN style="font-size: 12pt;"&gt;(CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N)&lt;/SPAN&gt;&lt;/P&gt;&lt;P align="left"&gt;&lt;SPAN style="font-size: 12pt;"&gt;Plugin output :&lt;/SPAN&gt;&lt;/P&gt;&lt;P align="left"&gt;&lt;SPAN style="font-size: 12pt;"&gt;Session ID :&lt;/SPAN&gt;&lt;/P&gt;&lt;P align="left"&gt;&lt;SPAN style="font-size: 12pt;"&gt;4e4c1b0b13d5e48b5421479419da1c95f8ca01da3f83eed7494f2d254389c9ec&lt;/SPAN&gt;&lt;/P&gt;&lt;P align="left"&gt;&lt;SPAN style="font-size: 12pt;"&gt;Initial Cipher : TLS1_CK_RSA_WITH_AES_256_CBC_SHA (0x0035)&lt;/SPAN&gt;&lt;/P&gt;&lt;P align="left"&gt;&lt;SPAN style="font-size: 12pt;"&gt;Resumed Cipher : TLS1_CK_RSA_WITH_3DES_EDE_CBC_SHA (0x000a)&lt;/SPAN&gt;&lt;/P&gt;&lt;P align="left"&gt;&lt;SPAN style="font-size: 12pt;"&gt;CVE : CVE-2010-4180&lt;/SPAN&gt;&lt;/P&gt;&lt;P align="left"&gt;&lt;SPAN style="font-size: 12pt;"&gt;BID : 45164&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12pt;"&gt;Other references : OSVDB:69565&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;Thanks,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;John&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 20:11:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/repeated-asa-5510-failed-vulnerability-scan-openssl-error/m-p/1653837#M559250</guid>
      <dc:creator>clippersbaseball</dc:creator>
      <dc:date>2019-03-11T20:11:35Z</dc:date>
    </item>
    <item>
      <title>Re: Repeated ASA 5510 failed vulnerability scan (OpenSSL error)</title>
      <link>https://community.cisco.com/t5/network-security/repeated-asa-5510-failed-vulnerability-scan-openssl-error/m-p/1653838#M559251</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi John,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The Cisco bug ID filed to track this vulnerability is CSCtk61443. You can read the details here:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;SPAN&gt;&lt;A class="jive-link-external-small" href="http://tools.cisco.com/Support/BugToolKit/search/getBugDetails.do?method=fetchBugDetails&amp;amp;bugId=CSCtk61443"&gt;http://tools.cisco.com/Support/BugToolKit/search/getBugDetails.do?method=fetchBugDetails&amp;amp;bugId=CSCtk61443&lt;/A&gt;&lt;/SPAN&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The vulnerability will be fixed in an upcoming release of 8.2.4.8. Please open up a TAC case to request this image for your ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Apr 2011 13:16:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/repeated-asa-5510-failed-vulnerability-scan-openssl-error/m-p/1653838#M559251</guid>
      <dc:creator>mirober2</dc:creator>
      <dc:date>2011-04-04T13:16:49Z</dc:date>
    </item>
    <item>
      <title>Repeated ASA 5510 failed vulnerability scan (OpenSSL error)</title>
      <link>https://community.cisco.com/t5/network-security/repeated-asa-5510-failed-vulnerability-scan-openssl-error/m-p/1653839#M559252</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Mike,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I seem to be having the same issue and I followed your bug and notice the bug says it has been fixed in version 8.2 (5).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have an ASA 5520 and running Cisco Adaptive Security Appliance Software Version 8.2(5)2 and we conducted a Pen test recently and the company picked this error, see my thread below.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.cisco.com/thread/2206441?tstart=0"&gt;https://supportforums.cisco.com/thread/2206441?tstart=0&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;- Zubair&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 20 Mar 2013 12:45:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/repeated-asa-5510-failed-vulnerability-scan-openssl-error/m-p/1653839#M559252</guid>
      <dc:creator>Zubair.Sayed_2</dc:creator>
      <dc:date>2013-03-20T12:45:19Z</dc:date>
    </item>
  </channel>
</rss>

