<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Weak SSL/TLS Key Exchange Vulnerability in Security Analytics</title>
    <link>https://community.cisco.com/t5/security-analytics/weak-ssl-tls-key-exchange-vulnerability/m-p/5081574#M1049</link>
    <description>&lt;P&gt;hello&lt;/P&gt;&lt;P&gt;everybody i hope your doing well&amp;nbsp;&lt;/P&gt;&lt;P&gt;i have asked this question many time i need your help in our network infrastructure we have cisco catalyst switch 9200 version 17.6&lt;/P&gt;&lt;P&gt;we have Qualys scan for vulnerability there is a certain vulnerability that wouldn't go away we have tried some of the solutions that the community suggested but with no avail we have tried the commands to disable or limit but nothing changed , after a while we noticed that only this switch have this problem we noticed the path is different so we took an image from the other c9200 that doesn't show the vulnerability in the scan took the image and installed after we scanned the same vulnerability remained anybody that have faced this issue ?&amp;nbsp;&lt;/P&gt;&lt;P&gt;please don't suggest rebooting as we have tried also we used commands to disable that and we tried limiting it&amp;nbsp;&lt;/P&gt;&lt;P&gt;Appreciate your support&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 29 Apr 2024 06:26:15 GMT</pubDate>
    <dc:creator>mohammedalrawiib</dc:creator>
    <dc:date>2024-04-29T06:26:15Z</dc:date>
    <item>
      <title>Weak SSL/TLS Key Exchange Vulnerability</title>
      <link>https://community.cisco.com/t5/security-analytics/weak-ssl-tls-key-exchange-vulnerability/m-p/5081574#M1049</link>
      <description>&lt;P&gt;hello&lt;/P&gt;&lt;P&gt;everybody i hope your doing well&amp;nbsp;&lt;/P&gt;&lt;P&gt;i have asked this question many time i need your help in our network infrastructure we have cisco catalyst switch 9200 version 17.6&lt;/P&gt;&lt;P&gt;we have Qualys scan for vulnerability there is a certain vulnerability that wouldn't go away we have tried some of the solutions that the community suggested but with no avail we have tried the commands to disable or limit but nothing changed , after a while we noticed that only this switch have this problem we noticed the path is different so we took an image from the other c9200 that doesn't show the vulnerability in the scan took the image and installed after we scanned the same vulnerability remained anybody that have faced this issue ?&amp;nbsp;&lt;/P&gt;&lt;P&gt;please don't suggest rebooting as we have tried also we used commands to disable that and we tried limiting it&amp;nbsp;&lt;/P&gt;&lt;P&gt;Appreciate your support&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 29 Apr 2024 06:26:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/security-analytics/weak-ssl-tls-key-exchange-vulnerability/m-p/5081574#M1049</guid>
      <dc:creator>mohammedalrawiib</dc:creator>
      <dc:date>2024-04-29T06:26:15Z</dc:date>
    </item>
    <item>
      <title>Re: Weak SSL/TLS Key Exchange Vulnerability</title>
      <link>https://community.cisco.com/t5/security-analytics/weak-ssl-tls-key-exchange-vulnerability/m-p/5082236#M1050</link>
      <description>&lt;P&gt;Hey &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1657352"&gt;@mohammedalrawiib&lt;/a&gt; -&lt;BR /&gt;&lt;BR /&gt;Sorry to hear about that problem with your Catalyst 9200 switch.&amp;nbsp; This Security Analytics forum is focused on the Secure Network Analytics and related product lines.&amp;nbsp; You are far more likely to recieve a helpful response if you ask in one of the forum areas specific to Catalyst switches.&amp;nbsp;&amp;nbsp; I might also suggest to include a better description of what Qualys reports the vulnerability as too.&lt;/P&gt;
&lt;P&gt;--jg&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 29 Apr 2024 13:21:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/security-analytics/weak-ssl-tls-key-exchange-vulnerability/m-p/5082236#M1050</guid>
      <dc:creator>jamegill</dc:creator>
      <dc:date>2024-04-29T13:21:57Z</dc:date>
    </item>
    <item>
      <title>Re: Weak SSL/TLS Key Exchange Vulnerability</title>
      <link>https://community.cisco.com/t5/security-analytics/weak-ssl-tls-key-exchange-vulnerability/m-p/5118515#M1058</link>
      <description>&lt;P&gt;Dears&amp;nbsp;&lt;/P&gt;&lt;P&gt;after a while we changed the ssh port number (default is 22) to another port also we blocked 22 port then the vulnerability was removed this is the solution that we found if you have any other solution please let us know would be helpful.&lt;/P&gt;&lt;P&gt;best regards&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 28 May 2024 12:54:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/security-analytics/weak-ssl-tls-key-exchange-vulnerability/m-p/5118515#M1058</guid>
      <dc:creator>mohammedalrawiib</dc:creator>
      <dc:date>2024-05-28T12:54:10Z</dc:date>
    </item>
  </channel>
</rss>

