<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SSL Medium Strength Cipher Suites Supported vulnerability in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ssl-medium-strength-cipher-suites-supported-vulnerability/m-p/1424458#M923809</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I zeroed the RSA key and generated a 1024 bit replacement.&amp;nbsp; Saved it, restarted the secure http server, and ran the Gideon scan against it.&amp;nbsp; I am still getting the same vulnerability.&amp;nbsp; Is there a way to turn off an individual cypher suite running in IOS?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Poirot&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 23 Feb 2010 16:22:56 GMT</pubDate>
    <dc:creator>poirot1967</dc:creator>
    <dc:date>2010-02-23T16:22:56Z</dc:date>
    <item>
      <title>SSL Medium Strength Cipher Suites Supported vulnerability</title>
      <link>https://community.cisco.com/t5/network-security/ssl-medium-strength-cipher-suites-supported-vulnerability/m-p/1424455#M923806</link>
      <description>&lt;P&gt;Kind of an odd thing.&amp;nbsp; We just had a vulnerability scan and a 2960 got pinged for supporting medium strength SSL cipher suites.&amp;nbsp; I say strange cause I have 3 others that have the same IOS image and they didn't get pinged.&amp;nbsp; Swap out the management IP address and they are all the same.&amp;nbsp; They are all running 12.2(52)SE C2960-LANBASEK9-M, with a 768 bit keys.&amp;nbsp; Here is the text of the vulnerability :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Synopsis : The remote service supports the use of medium strength SSL ciphers. Description : The remote host supports the use of SSL ciphers that offer medium strength encryption, which we currently regard as those with key lengths at least 56 bits and less than 112 bits.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Reconfigure the affected application if possible to avoid use of medium strength ciphers. / CVSS Base Score : 5.0 (CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N) Plugin output : Here are the medium strength SSL ciphers supported by the remote server : Medium Strength Ciphers (&amp;gt;= 56-bit and &amp;lt; 112-bit key) SSLv3 EDH-RSA-DES-CBC-SHA Kx=DH Au=RSA Enc=DES(56) Mac=SHA1 DES-CBC-SHA Kx=RSA Au=RSA Enc=DES(56) Mac=SHA1 TLSv1 EDH-RSA-DES-CBC-SHA Kx=DH Au=RSA Enc=DES(56) Mac=SHA1 DES-CBC-SHA Kx=RSA Au=RSA Enc=DES(56) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag}&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can someone point me in the right direction on how to re-configure the switch to pass this test?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Poirot&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 11:53:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssl-medium-strength-cipher-suites-supported-vulnerability/m-p/1424455#M923806</guid>
      <dc:creator>poirot1967</dc:creator>
      <dc:date>2020-02-21T11:53:01Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Medium Strength Cipher Suites Supported vulnerability</title>
      <link>https://community.cisco.com/t5/network-security/ssl-medium-strength-cipher-suites-supported-vulnerability/m-p/1424456#M923807</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I believe the alert there is because you are using a 768 key which was broken recently (Jan 2010 a paper was published on it with results from efforts that took 4 years to break 768 keys). 768bit RSA keys is not considered secure enough any more.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would suggest you to configure keys of 1024 on these switches and try again.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope it helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PK&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 22 Feb 2010 19:40:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssl-medium-strength-cipher-suites-supported-vulnerability/m-p/1424456#M923807</guid>
      <dc:creator>Panos Kampanakis</dc:creator>
      <dc:date>2010-02-22T19:40:45Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Medium Strength Cipher Suites Supported vulnerability</title>
      <link>https://community.cisco.com/t5/network-security/ssl-medium-strength-cipher-suites-supported-vulnerability/m-p/1424457#M923808</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the reply.&amp;nbsp; I zeroed the key of one of switches and started a scan on it.&amp;nbsp; I will let you know if that fixes it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Poirot&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 22 Feb 2010 20:07:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssl-medium-strength-cipher-suites-supported-vulnerability/m-p/1424457#M923808</guid>
      <dc:creator>poirot1967</dc:creator>
      <dc:date>2010-02-22T20:07:40Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Medium Strength Cipher Suites Supported vulnerability</title>
      <link>https://community.cisco.com/t5/network-security/ssl-medium-strength-cipher-suites-supported-vulnerability/m-p/1424458#M923809</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I zeroed the RSA key and generated a 1024 bit replacement.&amp;nbsp; Saved it, restarted the secure http server, and ran the Gideon scan against it.&amp;nbsp; I am still getting the same vulnerability.&amp;nbsp; Is there a way to turn off an individual cypher suite running in IOS?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Poirot&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 23 Feb 2010 16:22:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssl-medium-strength-cipher-suites-supported-vulnerability/m-p/1424458#M923809</guid>
      <dc:creator>poirot1967</dc:creator>
      <dc:date>2010-02-23T16:22:56Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Medium Strength Cipher Suites Supported vulnerability</title>
      <link>https://community.cisco.com/t5/network-security/ssl-medium-strength-cipher-suites-supported-vulnerability/m-p/1424459#M923810</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You cannot disable ciphersuites.&lt;/P&gt;&lt;P&gt;Try if "&lt;STRONG&gt;ip ssh version 2&lt;/STRONG&gt;" helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also check the difference in ssh and crypto key between the routers that don't see the vulnerability reports.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PK&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 23 Feb 2010 21:45:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssl-medium-strength-cipher-suites-supported-vulnerability/m-p/1424459#M923810</guid>
      <dc:creator>Panos Kampanakis</dc:creator>
      <dc:date>2010-02-23T21:45:50Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Medium Strength Cipher Suites Supported vulnerability</title>
      <link>https://community.cisco.com/t5/network-security/ssl-medium-strength-cipher-suites-supported-vulnerability/m-p/1424460#M923811</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Have the exact same issue.&lt;/P&gt;&lt;P&gt;I have 1024 crypto keys and ip ssh version 2 in the config.&lt;/P&gt;&lt;P&gt;Still shows up a vulnerability after re-scanning (using Tenable Nessus).&lt;/P&gt;&lt;P&gt;This happens on 2960, 3550, &amp;amp; 3750's.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 24 Mar 2010 13:07:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssl-medium-strength-cipher-suites-supported-vulnerability/m-p/1424460#M923811</guid>
      <dc:creator>dfultz</dc:creator>
      <dc:date>2010-03-24T13:07:50Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Medium Strength Cipher Suites Supported vulnerability</title>
      <link>https://community.cisco.com/t5/network-security/ssl-medium-strength-cipher-suites-supported-vulnerability/m-p/1424461#M923812</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yeah.&amp;nbsp; I told our ISSO that it was something that it would have to be deemed an acceptable risk as there was not a 'fix' for it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Poirot&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 24 Mar 2010 13:30:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssl-medium-strength-cipher-suites-supported-vulnerability/m-p/1424461#M923812</guid>
      <dc:creator>poirot1967</dc:creator>
      <dc:date>2010-03-24T13:30:39Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Medium Strength Cipher Suites Supported vulnerability</title>
      <link>https://community.cisco.com/t5/network-security/ssl-medium-strength-cipher-suites-supported-vulnerability/m-p/4408657#M1081057</link>
      <description>&lt;P&gt;Hi Panos,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I iam facing the same issue in switch.what will be solution.&lt;/P&gt;&lt;P&gt;I am looking forward your reply.&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Prashanth&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 26 May 2021 07:22:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssl-medium-strength-cipher-suites-supported-vulnerability/m-p/4408657#M1081057</guid>
      <dc:creator>poojaryp1974</dc:creator>
      <dc:date>2021-05-26T07:22:27Z</dc:date>
    </item>
  </channel>
</rss>

