<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Cisco IOS Software Internet Key Exchange Vulnerability Enquiry in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-ios-software-internet-key-exchange-vulnerability-enquiry/m-p/2166970#M920874</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Thanks, Marvin.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 04 Apr 2013 03:43:47 GMT</pubDate>
    <dc:creator>yenaungoo</dc:creator>
    <dc:date>2013-04-04T03:43:47Z</dc:date>
    <item>
      <title>Cisco IOS Software Internet Key Exchange Vulnerability Enquiry</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ios-software-internet-key-exchange-vulnerability-enquiry/m-p/2166968#M920872</link>
      <description>&lt;P&gt;&lt;STRONG style="font-size: 12pt; "&gt;&lt;A name="vps" target="_blank"&gt;Affected Products &lt;/A&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Cisco IOS devices are vulnerable when running a software image of an affected version of Cisco IOS Software that does not support IKE version 2 (IKEv2) and is configured to use IKE version 1 (IKEv1). &lt;/P&gt;&lt;DIV&gt;&lt;A style="text-decoration: none;" target="_blank"&gt;&lt;H3&gt;&lt;/H3&gt;&lt;/A&gt;&lt;H3&gt;&lt;SPAN style="font-size: 12pt;"&gt;&lt;A name="vps" target="_blank"&gt;Vulnerable Products &lt;/A&gt;&lt;/SPAN&gt;&lt;/H3&gt;&lt;DIV id="ciscostylesheetid_svps"&gt;&lt;DIV&gt;This vulnerability affects the 15.1GC, 15.1T, and 15.1XB Cisco IOS Software release trains. No other Cisco IOS Software release trains are affected.&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;Ref: &lt;A href="http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130327-ike" target="_blank"&gt;http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130327-ike&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What happen if we are using "not affected version (eg; 12.4, 15.0 releases)" and configured with IKE version1?&amp;nbsp; Can it be affected by this vulnerability?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Router #sh subsys | include ikev2&lt;/P&gt;&lt;P&gt;ikev2_cli_registry Registry&amp;nbsp;&amp;nbsp; 1.000.001&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks &amp;amp; Regards,&lt;/P&gt;&lt;P&gt;Ye&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 12:51:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ios-software-internet-key-exchange-vulnerability-enquiry/m-p/2166968#M920872</guid>
      <dc:creator>yenaungoo</dc:creator>
      <dc:date>2020-02-21T12:51:45Z</dc:date>
    </item>
    <item>
      <title>Cisco IOS Software Internet Key Exchange Vulnerability Enquiry</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ios-software-internet-key-exchange-vulnerability-enquiry/m-p/2166969#M920873</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You are not affected by this vulnerability. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As the notice states - "&lt;SPAN style="font-size: 10pt;"&gt;There are no affected 12.4 based releases&lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt;"&gt;" and "&lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt;"&gt;There are no affected 15.0 based releases".&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 03 Apr 2013 02:46:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ios-software-internet-key-exchange-vulnerability-enquiry/m-p/2166969#M920873</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2013-04-03T02:46:18Z</dc:date>
    </item>
    <item>
      <title>Cisco IOS Software Internet Key Exchange Vulnerability Enquiry</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ios-software-internet-key-exchange-vulnerability-enquiry/m-p/2166970#M920874</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Thanks, Marvin.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Apr 2013 03:43:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ios-software-internet-key-exchange-vulnerability-enquiry/m-p/2166970#M920874</guid>
      <dc:creator>yenaungoo</dc:creator>
      <dc:date>2013-04-04T03:43:47Z</dc:date>
    </item>
  </channel>
</rss>

