<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic OpenSSL version in IOS in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/openssl-version-in-ios/m-p/2090737#M921044</link>
    <description>&lt;P&gt;Hi networkers,&lt;/P&gt;&lt;P&gt;I recently run a pentest against a 2911 router. It mentioned the following message:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[quote]Vulnerability allows remote attackers to force the downgrade to an unintended&amp;nbsp; cipher. &lt;/P&gt;&lt;DIV id="descr"&gt;OpenSSL before 0.9.8q, and 1.0.x&amp;nbsp; before 1.0.0c, when SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG is enabled, does not&amp;nbsp; properly prevent modification of the ciphersuite in the session cache, which&amp;nbsp; allows remote attackers to force the downgrade to an unintended cipher via&amp;nbsp; vectors involving sniffing network traffic to discover a session&amp;nbsp; identifier."&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;&lt;DIV id="solution"&gt;To fix the vulnerability update&amp;nbsp; your software according to used platform. All necessary information is available&amp;nbsp; here:&lt;BR /&gt;&lt;A class="active_link" href="http://www.openssl.org/" rel="nofollow" target="_blank"&gt;http://www.openssl.org/&lt;/A&gt; "&lt;P&gt;[/quote]&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;Is there a way to detect the version of SSL implemented on a router?&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;Thanks,&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;Wass&lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;/DIV&gt;</description>
    <pubDate>Fri, 21 Feb 2020 12:47:53 GMT</pubDate>
    <dc:creator>Wassim Aouadi</dc:creator>
    <dc:date>2020-02-21T12:47:53Z</dc:date>
    <item>
      <title>OpenSSL version in IOS</title>
      <link>https://community.cisco.com/t5/network-security/openssl-version-in-ios/m-p/2090737#M921044</link>
      <description>&lt;P&gt;Hi networkers,&lt;/P&gt;&lt;P&gt;I recently run a pentest against a 2911 router. It mentioned the following message:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[quote]Vulnerability allows remote attackers to force the downgrade to an unintended&amp;nbsp; cipher. &lt;/P&gt;&lt;DIV id="descr"&gt;OpenSSL before 0.9.8q, and 1.0.x&amp;nbsp; before 1.0.0c, when SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG is enabled, does not&amp;nbsp; properly prevent modification of the ciphersuite in the session cache, which&amp;nbsp; allows remote attackers to force the downgrade to an unintended cipher via&amp;nbsp; vectors involving sniffing network traffic to discover a session&amp;nbsp; identifier."&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;&lt;DIV id="solution"&gt;To fix the vulnerability update&amp;nbsp; your software according to used platform. All necessary information is available&amp;nbsp; here:&lt;BR /&gt;&lt;A class="active_link" href="http://www.openssl.org/" rel="nofollow" target="_blank"&gt;http://www.openssl.org/&lt;/A&gt; "&lt;P&gt;[/quote]&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;Is there a way to detect the version of SSL implemented on a router?&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;Thanks,&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;Wass&lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;/DIV&gt;</description>
      <pubDate>Fri, 21 Feb 2020 12:47:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/openssl-version-in-ios/m-p/2090737#M921044</guid>
      <dc:creator>Wassim Aouadi</dc:creator>
      <dc:date>2020-02-21T12:47:53Z</dc:date>
    </item>
    <item>
      <title>OpenSSL version in IOS</title>
      <link>https://community.cisco.com/t5/network-security/openssl-version-in-ios/m-p/2090738#M921045</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Wass,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When an IOS image is released, it is linked to a single OpenSSL version.&amp;nbsp; If there is a specific IOS image you are concerned with, provide Cisco with the exact IOS image name, and we can return the OpenSSL version for that image to you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However, if you are trying to find the OpenSSL version for an ASA (Adaptive Security Appliance), you can determine this version from the ASA release notes.&amp;nbsp; Simply examine the "Open Source" notes that are located in the release notes of the particular ASA image you are concerned with.&amp;nbsp; For example, from the ASA 8.4 release notes, you will find a section titled "Related Documentation", which has a link that points to "ASA Series Documentation".&amp;nbsp; From there, you will find a link for "Open Source License".&amp;nbsp; That will take you to an "Open Source" page which reveals that the OpenSSL version that runs on the ASA 8.4 code is "0.9.8f"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As a side note, you can determine the OpenSSL version running on a "client" computer by issuing the "ssh -v" command.&amp;nbsp; For example, on my own Mac we can see that I'm running OpenSSL version 0.9.8r.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;mveedock-mac:~ mikeveedock$ ssh -v cisco@10.1.1.1&lt;/P&gt;&lt;P&gt;OpenSSH_5.2p1, OpenSSL 0.9.8r 8 Feb 2011&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-- &lt;/P&gt;&lt;P&gt;Mike Veedock&lt;/P&gt;&lt;P&gt;VPN Engineer – Cisco Systems&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 21 Mar 2013 16:56:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/openssl-version-in-ios/m-p/2090738#M921045</guid>
      <dc:creator>mveedock</dc:creator>
      <dc:date>2013-03-21T16:56:43Z</dc:date>
    </item>
    <item>
      <title>Re: OpenSSL version in IOS</title>
      <link>https://community.cisco.com/t5/network-security/openssl-version-in-ios/m-p/3174432#M921046</link>
      <description>&lt;P&gt;what version of openSSL is used in c880data-universalk9-mz.152-4.M5.bin?&lt;/P&gt;</description>
      <pubDate>Wed, 23 Aug 2017 08:41:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/openssl-version-in-ios/m-p/3174432#M921046</guid>
      <dc:creator>smanfre</dc:creator>
      <dc:date>2017-08-23T08:41:16Z</dc:date>
    </item>
  </channel>
</rss>

