<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SSH VULNERABILITY ON WLC 5508 in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/ssh-vulnerability-on-wlc-5508/m-p/5241316#M279305</link>
    <description>&lt;P&gt;As the others have already pointed out the 5508 is long past end of support so you use them at your own risk because they are unsupported.&lt;/P&gt;
&lt;P&gt;Nevertheless:&lt;BR /&gt;-&amp;nbsp;&lt;SPAN&gt;Accounts with default, null, blank, or missing passwords have been identified.&lt;/SPAN&gt;&lt;BR /&gt;It's up to &lt;STRONG&gt;you&lt;/STRONG&gt; to fix this! Make sure all your user accounts have long complex passwords which are changed regularly. Ideally use a solution like TACACS to provide central authentication and authorisation (AAA) and avoid using local username/passwords except as last resort.&amp;nbsp; There's lots of advice to be found on username and password security on the internet.&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Release: 8.5.151.0 is dreadfully old and out of date.&amp;nbsp; At the minimum you should upgrade to the last available release (&lt;STRONG&gt;8.5.182.12&lt;/STRONG&gt;) which contains a number of security vulnerability fixes since 8.5.151.0.&amp;nbsp; The download link is in my signature text below (it's not on the standard download pages).&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Use infrastructure ACLs and/or firewall to protect the WLCs from SSH coming into your network from outside.&lt;BR /&gt;Use CPU ACL on the WLC to restrict SSH access to the WLC itself.&lt;BR /&gt;As&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1065752"&gt;@MHM Cisco World&lt;/a&gt;&amp;nbsp;said disable management over wireless.&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 27 Dec 2024 16:17:25 GMT</pubDate>
    <dc:creator>Rich R</dc:creator>
    <dc:date>2024-12-27T16:17:25Z</dc:date>
    <item>
      <title>SSH VULNERABILITY ON WLC 5508</title>
      <link>https://community.cisco.com/t5/wireless/ssh-vulnerability-on-wlc-5508/m-p/5240992#M279270</link>
      <description>&lt;P&gt;&amp;nbsp;i have 2 WLC&amp;nbsp;&lt;/P&gt;
&lt;P&gt;AIR-CT5508-50-K9&amp;nbsp; AND&amp;nbsp;AIR-CT5508-25-K9&amp;nbsp;Release: 8.5.151.0&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;o Type of Vulnerability: SSH Bruteforceo SSH bruteforce login attempts have been detected.&lt;BR /&gt;o One or more valid SSH user logins have been found through bruteforcing.&lt;BR /&gt;o Accounts with default, null, blank, or missing passwords have been identified.&lt;BR /&gt;o Associated CVEs: CVE-1999-0508, CVE-1999-0502, CVE-2015-7755.&lt;/P&gt;
&lt;P&gt;Can you help me solve this problem please ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 26 Dec 2024 16:06:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ssh-vulnerability-on-wlc-5508/m-p/5240992#M279270</guid>
      <dc:creator>Dechamo</dc:creator>
      <dc:date>2024-12-26T16:06:50Z</dc:date>
    </item>
    <item>
      <title>Re: SSH VULNERABILITY ON WLC 5508</title>
      <link>https://community.cisco.com/t5/wireless/ssh-vulnerability-on-wlc-5508/m-p/5240994#M279271</link>
      <description>&lt;P&gt;Sorry is this issue related to ASA ?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Why yoh tag it with ASA&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Thu, 26 Dec 2024 16:08:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ssh-vulnerability-on-wlc-5508/m-p/5240994#M279271</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-12-26T16:08:49Z</dc:date>
    </item>
    <item>
      <title>Re: SSH VULNERABILITY ON WLC 5508</title>
      <link>https://community.cisco.com/t5/wireless/ssh-vulnerability-on-wlc-5508/m-p/5240995#M279272</link>
      <description>Sorry, it's not an ASA but a WLC 5508.&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Thu, 26 Dec 2024 16:12:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ssh-vulnerability-on-wlc-5508/m-p/5240995#M279272</guid>
      <dc:creator>Dechamo</dc:creator>
      <dc:date>2024-12-26T16:12:23Z</dc:date>
    </item>
    <item>
      <title>Re: SSH VULNERABILITY ON WLC 5508</title>
      <link>https://community.cisco.com/t5/wireless/ssh-vulnerability-on-wlc-5508/m-p/5241003#M279273</link>
      <description>&lt;P&gt;5508 is well past any vulnerability fixes, so there really isn't anything you can do about the issue. July 2021 was the end of vulnerability support.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/products/collateral/wireless/5500-series-wireless-controllers/eos-eol-notice-c51-740221.html" target="_blank"&gt;https://www.cisco.com/c/en/us/products/collateral/wireless/5500-series-wireless-controllers/eos-eol-notice-c51-740221.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 26 Dec 2024 16:47:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ssh-vulnerability-on-wlc-5508/m-p/5241003#M279273</guid>
      <dc:creator>Dustin Anderson</dc:creator>
      <dc:date>2024-12-26T16:47:22Z</dc:date>
    </item>
    <item>
      <title>Re: SSH VULNERABILITY ON WLC 5508</title>
      <link>https://community.cisco.com/t5/wireless/ssh-vulnerability-on-wlc-5508/m-p/5241005#M279274</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1622779"&gt;@Dechamo&lt;/a&gt; based on the information you provided, you should set passwords on the user accounts on the WLC.&lt;/P&gt;
&lt;P&gt;You should at a minimum consider upgrading the software image, 8.5.151.0 is over 5.5 years old, the latest version 8.5.182.0, is still 3 years old. You should consider replacing the hardware, as the 5508 is end of support.&lt;/P&gt;</description>
      <pubDate>Thu, 26 Dec 2024 16:50:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ssh-vulnerability-on-wlc-5508/m-p/5241005#M279274</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2024-12-26T16:50:46Z</dc:date>
    </item>
    <item>
      <title>Re: SSH VULNERABILITY ON WLC 5508</title>
      <link>https://community.cisco.com/t5/wireless/ssh-vulnerability-on-wlc-5508/m-p/5241007#M279275</link>
      <description>&lt;P&gt;Try disable mgmt over wireless&lt;/P&gt;
&lt;P&gt;It can reduce this DoS attack&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Thu, 26 Dec 2024 16:59:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ssh-vulnerability-on-wlc-5508/m-p/5241007#M279275</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-12-26T16:59:46Z</dc:date>
    </item>
    <item>
      <title>Re: SSH VULNERABILITY ON WLC 5508</title>
      <link>https://community.cisco.com/t5/wireless/ssh-vulnerability-on-wlc-5508/m-p/5241094#M279280</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1622779"&gt;@Dechamo&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;o Type of Vulnerability: SSH Bruteforceo SSH bruteforce login attempts have been detected.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;o One or more valid SSH user logins have been found through bruteforcing.&lt;/SPAN&gt;&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;Where is SSH attempts coming from?&amp;nbsp; Are they coming from external IP address?&lt;/P&gt;</description>
      <pubDate>Fri, 27 Dec 2024 01:08:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ssh-vulnerability-on-wlc-5508/m-p/5241094#M279280</guid>
      <dc:creator>Leo Laohoo</dc:creator>
      <dc:date>2024-12-27T01:08:24Z</dc:date>
    </item>
    <item>
      <title>Re: SSH VULNERABILITY ON WLC 5508</title>
      <link>https://community.cisco.com/t5/wireless/ssh-vulnerability-on-wlc-5508/m-p/5241316#M279305</link>
      <description>&lt;P&gt;As the others have already pointed out the 5508 is long past end of support so you use them at your own risk because they are unsupported.&lt;/P&gt;
&lt;P&gt;Nevertheless:&lt;BR /&gt;-&amp;nbsp;&lt;SPAN&gt;Accounts with default, null, blank, or missing passwords have been identified.&lt;/SPAN&gt;&lt;BR /&gt;It's up to &lt;STRONG&gt;you&lt;/STRONG&gt; to fix this! Make sure all your user accounts have long complex passwords which are changed regularly. Ideally use a solution like TACACS to provide central authentication and authorisation (AAA) and avoid using local username/passwords except as last resort.&amp;nbsp; There's lots of advice to be found on username and password security on the internet.&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Release: 8.5.151.0 is dreadfully old and out of date.&amp;nbsp; At the minimum you should upgrade to the last available release (&lt;STRONG&gt;8.5.182.12&lt;/STRONG&gt;) which contains a number of security vulnerability fixes since 8.5.151.0.&amp;nbsp; The download link is in my signature text below (it's not on the standard download pages).&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Use infrastructure ACLs and/or firewall to protect the WLCs from SSH coming into your network from outside.&lt;BR /&gt;Use CPU ACL on the WLC to restrict SSH access to the WLC itself.&lt;BR /&gt;As&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1065752"&gt;@MHM Cisco World&lt;/a&gt;&amp;nbsp;said disable management over wireless.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 27 Dec 2024 16:17:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ssh-vulnerability-on-wlc-5508/m-p/5241316#M279305</guid>
      <dc:creator>Rich R</dc:creator>
      <dc:date>2024-12-27T16:17:25Z</dc:date>
    </item>
    <item>
      <title>Re: SSH VULNERABILITY ON WLC 5508</title>
      <link>https://community.cisco.com/t5/wireless/ssh-vulnerability-on-wlc-5508/m-p/5242062#M279370</link>
      <description>&lt;P&gt;Might as well put my 2cents.... If you have TACACS and or syslog, you should be able to detect and see where any failures are coming from.&amp;nbsp; That way you can put a plan into action.&amp;nbsp; What you are seeing is because you are probably using local accounts, this would be something in general you should be cleaning up even with other network devices you have in your network.&amp;nbsp; This should be an eye opener and something you should plan on reviewing not just on your 5508's, but everywhere.&amp;nbsp; TACACS is what you should implement if not already, also if you are using TACACS, you probably are allowing local then TACACS, which might be why the scans are catching this.&lt;/P&gt;</description>
      <pubDate>Mon, 30 Dec 2024 18:20:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ssh-vulnerability-on-wlc-5508/m-p/5242062#M279370</guid>
      <dc:creator>Scott Fella</dc:creator>
      <dc:date>2024-12-30T18:20:23Z</dc:date>
    </item>
  </channel>
</rss>

