<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic WLC Drown vulnerability in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/wlc-drown-vulnerability/m-p/2883783#M5940</link>
    <description>&lt;P&gt;Is Cisco WLC vulnerable to DROWN attack ?&lt;/P&gt;
&lt;P&gt;the cisco security advisor&amp;nbsp;is not very clear abot that and about the steps you must follow to protect the controller.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160302-openssl" target="_blank"&gt;https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160302-openssl&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Do I need to disable SSLv2 in the wireless controller?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;thanks&lt;/P&gt;</description>
    <pubDate>Mon, 05 Jul 2021 11:43:59 GMT</pubDate>
    <dc:creator>jmprats</dc:creator>
    <dc:date>2021-07-05T11:43:59Z</dc:date>
    <item>
      <title>WLC Drown vulnerability</title>
      <link>https://community.cisco.com/t5/wireless/wlc-drown-vulnerability/m-p/2883783#M5940</link>
      <description>&lt;P&gt;Is Cisco WLC vulnerable to DROWN attack ?&lt;/P&gt;
&lt;P&gt;the cisco security advisor&amp;nbsp;is not very clear abot that and about the steps you must follow to protect the controller.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160302-openssl" target="_blank"&gt;https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160302-openssl&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Do I need to disable SSLv2 in the wireless controller?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;thanks&lt;/P&gt;</description>
      <pubDate>Mon, 05 Jul 2021 11:43:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/wlc-drown-vulnerability/m-p/2883783#M5940</guid>
      <dc:creator>jmprats</dc:creator>
      <dc:date>2021-07-05T11:43:59Z</dc:date>
    </item>
    <item>
      <title>It is since today that the</title>
      <link>https://community.cisco.com/t5/wireless/wlc-drown-vulnerability/m-p/2883784#M5941</link>
      <description>&lt;P&gt;It is since today that the website shows that the WLC is vulnerable. From my own testing the WLC has SSL (version 2 and 3) disabled for the web interface with software 8.0 and higher. You have to turn it on manually with the help of the &lt;EM&gt;"config network secureweb xyz"&lt;/EM&gt; commands. By default it will correctly send a TCP reset if your browser only tries to negotiate SSL and not the current TLS standards. &lt;BR /&gt;&lt;BR /&gt;I'm wondering why they listed the latest release as vulnerable while the default configuration has it disabled for quite some time. Maybe there is another service which uses SSL, but I have no idea what that can be (CAPWAP uses DTLS for example). I guess we have to wait for more information, in the mean time you can use the &lt;EM&gt;"show network summary"&lt;/EM&gt; command to verify that SSL has been disabled for the web interface.&lt;BR /&gt;&lt;BR /&gt;&lt;EM&gt;Please rate useful posts... &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 08 Mar 2016 21:33:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/wlc-drown-vulnerability/m-p/2883784#M5941</guid>
      <dc:creator>Freerk Terpstra</dc:creator>
      <dc:date>2016-03-08T21:33:57Z</dc:date>
    </item>
    <item>
      <title>Which version of WLC are you</title>
      <link>https://community.cisco.com/t5/wireless/wlc-drown-vulnerability/m-p/2883785#M5942</link>
      <description>&lt;P&gt;Which version of WLC are you using ?&lt;/P&gt;
&lt;P&gt;In the document which you had provided has bug related to version 8.3(15.85).&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Another BUG for your reference.&lt;/P&gt;
&lt;DIV class="bugTitle"&gt;SSLv3 Poodle attack against https in wlc, CVE-2014­-3566&lt;/DIV&gt;
&lt;DIV class="bugId"&gt;CSCur27551&lt;/DIV&gt;
&lt;DIV class="sectionHeader bugDescription"&gt;
&lt;DIV id="descriptionArrowImage" title="Expand collapse description" class="downArrowImage" onclick="hideShowSection(event, &amp;quot;bugDescriptionContent&amp;quot;, &amp;quot;descriptionArrowImage&amp;quot;)" onkeypress="hideShowSection(event, &amp;quot;bugDescriptionContent&amp;quot;, &amp;quot;descriptionArrowImage&amp;quot;)" tabindex="21"&gt;&lt;/DIV&gt;
&lt;DIV class="title"&gt;&lt;A name="description" style="text-decoration: none;"&gt;&lt;/A&gt;Description&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV class="bugDescriptionContent"&gt;
&lt;DIV style="display: table; margin-top: -13px;"&gt;
&lt;DIV class="releaseNoteText"&gt;&lt;B&gt;Symptom:&lt;/B&gt;&lt;BR /&gt;This product includes a version of SSL that is affected by the vulnerability identified by the Common Vulnerability and Exposures (CVE) IDs:&lt;BR /&gt;&lt;BR /&gt;CVE-2014-3566&lt;BR /&gt;&lt;BR /&gt;This bug has been opened to address the potential impact on this product.&lt;BR /&gt;This applies to all WLCs types (5500/wism2/2500/4400/2100/7500/8500, etc)&lt;BR /&gt;&lt;BR /&gt;&lt;B&gt;Conditions:&lt;/B&gt;&lt;BR /&gt;HTTPS Management, webauth are vulnerable by default&lt;BR /&gt;&lt;BR /&gt;&lt;B&gt;Workaround:&lt;/B&gt;&lt;BR /&gt;Use FIPS mode (config switchconfig fips-prerequisite enable ), as it restricts the supported cipher suits&lt;BR /&gt;Note: this config change has implications on other features, for example, restricting to SNMPv3, crypto protocols are set for only HMAC-SHA1, no RC4, etc. so validate if it is applicable on your usage scenario, and compatibility for management applications connecting to the WLC&lt;BR /&gt;it is recommended to move to a fixed version&lt;BR /&gt;&lt;BR /&gt;&lt;B&gt;Further Problem Description:&lt;/B&gt;&lt;BR /&gt;Fix now available in 7.0.251.2, 7.4.130.0, 8.0.110.0 in CCO&lt;BR /&gt;&lt;BR /&gt;Type of behavior change: TLSv1 will be used for webadmin/web-auth access on WLC by default. SSLv3 which was earlier used is disabled.&lt;BR /&gt; &lt;BR /&gt;Impact: Clients now have to use TLSv1 for webadmin/web-auth. If they want to use SSLv3 only then SSLv3 needs to be enabled using CLI:&lt;BR /&gt; config network secureweb sslv3 enable &lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;B&gt;PSIRT Evaluation:&lt;/B&gt;&lt;BR /&gt;The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the&lt;BR /&gt; time of evaluation are: 2.6/2.5&lt;BR /&gt;&lt;BR /&gt;&lt;A target="_blank" style="color: #007fc5;" href="https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&amp;amp;version=2&amp;amp;vector=AV:N/AC:H/Au:N/C:P/I:N/A:N/E:F/RL:U/RC:C"&gt;https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&amp;amp;version=2&amp;amp;vector=AV:N/AC:H/Au:N/C:P/I:N/A:N/E:F/RL:U/RC:C&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;The Cisco PSIRT has assigned this score based on information obtained from multiple sources. This includes the CVSS score assigned by the third-party vendor when available. The CVSS score assigned may not reflect the actual impact on the Cisco Product.&lt;BR /&gt;&lt;BR /&gt;Additional information on Cisco's security vulnerability policy can be found at the following URL:&lt;BR /&gt;&lt;BR /&gt;&lt;A target="_blank" style="color: #007fc5;" href="http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html"&gt;http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html&lt;/A&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;</description>
      <pubDate>Wed, 09 Mar 2016 01:53:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/wlc-drown-vulnerability/m-p/2883785#M5942</guid>
      <dc:creator>mohanak</dc:creator>
      <dc:date>2016-03-09T01:53:24Z</dc:date>
    </item>
  </channel>
</rss>

