<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Multiple Vulnerabilities in in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/openssl-vulnerabilities-in-wlc-7-4-110-0/m-p/2493462#M6444</link>
    <description>&lt;DIV class="bugTitle"&gt;&lt;SPAN style="font-family:times new roman,times,serif;"&gt;Multiple Vulnerabilities in OpenSSL - June 2014&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV class="bugId"&gt;&lt;SPAN style="font-family:times new roman,times,serif;"&gt;CSCup22587&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV class="sectionHeader bugDescription"&gt;&lt;DIV class="downArrowImage" id="descriptionArrowImage" tabindex="21" title="Expand collapse description"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="title"&gt;&lt;SPAN style="font-family:times new roman,times,serif;"&gt;&lt;A name="description" style="text-decoration:none"&gt;Description&lt;/A&gt;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV style="display:table;margin-top:-13px;"&gt;&lt;DIV class="releaseNoteText"&gt;&lt;BR /&gt;&lt;SPAN style="font-family:times new roman,times,serif;"&gt;&lt;B&gt;&lt;B&gt;Symptom:&lt;/B&gt;&lt;/B&gt;&lt;BR /&gt;The following Cisco products:&lt;BR /&gt;&lt;BR /&gt;Wireless Lan Controllers: 5500, 2500, Wism1, Wism2, 7500, 8500, 2100, NM-WLC, 4400&lt;BR /&gt;&lt;BR /&gt;include a version of openssl that is affected by the vulnerabilities identified by the Common Vulnerability and Exposures (CVE) IDs:&lt;BR /&gt;&lt;BR /&gt;CVE-2014-0224 - SSL/TLS MITM vulnerability&lt;BR /&gt;CVE-2014-0221 - DTLS recursion flaw&lt;BR /&gt;CVE-2014-3470 - Anonymous ECDH denial of service&lt;BR /&gt;CVE-2014-0221 - DTLS recursion flaw&lt;BR /&gt;CVE-2014-0195 - DTLS invalid fragment vulnerability&lt;BR /&gt;&lt;BR /&gt;This bug has been opened to address the potential impact on this product.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;B&gt;&lt;B&gt;Conditions:&lt;/B&gt;&lt;/B&gt;&lt;BR /&gt;Devices with default configuration.&lt;BR /&gt;&lt;BR /&gt;&lt;B&gt;Affected Releases&lt;/B&gt;&lt;BR /&gt;All 4.x, 5.x, 6.x, 7.0.x, 7.2.x, 7.3.x, 7.4.x, 7.5.x, 7.6.x&lt;BR /&gt;&lt;B&gt;Workaround:&lt;/B&gt;Not Available&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;B&gt;&lt;B&gt;More Info:&lt;/B&gt;&lt;/B&gt;&lt;BR /&gt;CVE-2014-3470: EDCH is not in use, but a patch for the issue will be included&lt;BR /&gt;&lt;BR /&gt;&lt;B&gt;Fixed Releases&lt;/B&gt;&lt;BR /&gt;Upcoming: 7.4.130.0, 7.6.130.0, 8.0, 7.0.x&lt;BR /&gt;Will not be fixed: 4.x, 5.x, 6.x, 7.2.x, 7.3.x, 7.5.x (all end of engineering maintenance)&lt;BR /&gt;&lt;BR /&gt;Fixed code will be posted in CCO soon. For beta access contact wnbu-mrbeta@external.cisco.com&lt;BR /&gt;&lt;BR /&gt;&lt;B&gt;PSIRT Evaluation:&lt;/B&gt;&lt;BR /&gt;The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 7.8/7.5:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://intellishield.cisco.com/security/alertmanager/cvss?target=new&amp;amp;version=2.0&amp;amp;vector=AV:N/AC:L/Au:N/C:N/I:N/A:C/E:F/RL:U/RC:C" target="_blank"&gt;https://intellishield.cisco.com/security/alertmanager/cvss?target=new&amp;amp;version=2.0&amp;amp;vector=AV:N/AC:L/Au:N/C:N/I:N/A:C/E:F/RL:U/RC:C&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;The Cisco PSIRT has assigned this score based on information obtained from multiple sources. This includes the CVSS score assigned by the third-party vendor when available. The CVSS score assigned may not reflect the actual impact on the Cisco Product.&lt;BR /&gt;&lt;BR /&gt;Additional information on Cisco's security vulnerability policy can be found at the following URL:&lt;BR /&gt;&lt;BR /&gt;http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV class="currentRatingDesc"&gt;&lt;DIV id="cdetsButton" style="width:100%;padding-top:6px;clear:both;"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;</description>
    <pubDate>Fri, 11 Jul 2014 08:11:25 GMT</pubDate>
    <dc:creator>mohanak</dc:creator>
    <dc:date>2014-07-11T08:11:25Z</dc:date>
    <item>
      <title>OpenSSL vulnerabilities in WLC 7.4.110.0</title>
      <link>https://community.cisco.com/t5/wireless/openssl-vulnerabilities-in-wlc-7-4-110-0/m-p/2493460#M6442</link>
      <description>&lt;P&gt;Hi, version 7.4.11.0 is vulnerable to the following CVE IDs:&lt;/P&gt;&lt;DL class="vulnInfo"&gt;&lt;DD&gt;&lt;A href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0224" target="cve_id"&gt;CVE-2014-0224&lt;/A&gt; &lt;A href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0221" target="cve_id"&gt;CVE-2014-0221&lt;/A&gt; &lt;A href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0195" target="cve_id"&gt;CVE-2014-0195&lt;/A&gt; &lt;A href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0198" target="cve_id"&gt;CVE-2014-0198&lt;/A&gt; &lt;A href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5298" target="cve_id"&gt;CVE-2010-5298&lt;/A&gt; &lt;A href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3470" target="cve_id"&gt;CVE-2014-3470&lt;/A&gt; &lt;A href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0076" target="cve_id"&gt;CVE-2014-0076&lt;/A&gt;&lt;/DD&gt;&lt;DD&gt;&amp;nbsp;&lt;/DD&gt;&lt;DD&gt;Is there a patch, that could fix it?&lt;/DD&gt;&lt;DD&gt;&amp;nbsp;&lt;/DD&gt;&lt;DD&gt;Thanks!&lt;/DD&gt;&lt;DD&gt;&amp;nbsp;&lt;/DD&gt;&lt;/DL&gt;</description>
      <pubDate>Mon, 05 Jul 2021 08:12:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/openssl-vulnerabilities-in-wlc-7-4-110-0/m-p/2493460#M6442</guid>
      <dc:creator>Rene S.</dc:creator>
      <dc:date>2021-07-05T08:12:59Z</dc:date>
    </item>
    <item>
      <title>Use firmware version 7.4.121</title>
      <link>https://community.cisco.com/t5/wireless/openssl-vulnerabilities-in-wlc-7-4-110-0/m-p/2493461#M6443</link>
      <description>&lt;P&gt;Use firmware version 7.4.121.0.&lt;/P&gt;</description>
      <pubDate>Fri, 11 Jul 2014 07:47:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/openssl-vulnerabilities-in-wlc-7-4-110-0/m-p/2493461#M6443</guid>
      <dc:creator>Leo Laohoo</dc:creator>
      <dc:date>2014-07-11T07:47:24Z</dc:date>
    </item>
    <item>
      <title>Multiple Vulnerabilities in</title>
      <link>https://community.cisco.com/t5/wireless/openssl-vulnerabilities-in-wlc-7-4-110-0/m-p/2493462#M6444</link>
      <description>&lt;DIV class="bugTitle"&gt;&lt;SPAN style="font-family:times new roman,times,serif;"&gt;Multiple Vulnerabilities in OpenSSL - June 2014&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV class="bugId"&gt;&lt;SPAN style="font-family:times new roman,times,serif;"&gt;CSCup22587&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV class="sectionHeader bugDescription"&gt;&lt;DIV class="downArrowImage" id="descriptionArrowImage" tabindex="21" title="Expand collapse description"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="title"&gt;&lt;SPAN style="font-family:times new roman,times,serif;"&gt;&lt;A name="description" style="text-decoration:none"&gt;Description&lt;/A&gt;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV style="display:table;margin-top:-13px;"&gt;&lt;DIV class="releaseNoteText"&gt;&lt;BR /&gt;&lt;SPAN style="font-family:times new roman,times,serif;"&gt;&lt;B&gt;&lt;B&gt;Symptom:&lt;/B&gt;&lt;/B&gt;&lt;BR /&gt;The following Cisco products:&lt;BR /&gt;&lt;BR /&gt;Wireless Lan Controllers: 5500, 2500, Wism1, Wism2, 7500, 8500, 2100, NM-WLC, 4400&lt;BR /&gt;&lt;BR /&gt;include a version of openssl that is affected by the vulnerabilities identified by the Common Vulnerability and Exposures (CVE) IDs:&lt;BR /&gt;&lt;BR /&gt;CVE-2014-0224 - SSL/TLS MITM vulnerability&lt;BR /&gt;CVE-2014-0221 - DTLS recursion flaw&lt;BR /&gt;CVE-2014-3470 - Anonymous ECDH denial of service&lt;BR /&gt;CVE-2014-0221 - DTLS recursion flaw&lt;BR /&gt;CVE-2014-0195 - DTLS invalid fragment vulnerability&lt;BR /&gt;&lt;BR /&gt;This bug has been opened to address the potential impact on this product.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;B&gt;&lt;B&gt;Conditions:&lt;/B&gt;&lt;/B&gt;&lt;BR /&gt;Devices with default configuration.&lt;BR /&gt;&lt;BR /&gt;&lt;B&gt;Affected Releases&lt;/B&gt;&lt;BR /&gt;All 4.x, 5.x, 6.x, 7.0.x, 7.2.x, 7.3.x, 7.4.x, 7.5.x, 7.6.x&lt;BR /&gt;&lt;B&gt;Workaround:&lt;/B&gt;Not Available&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;B&gt;&lt;B&gt;More Info:&lt;/B&gt;&lt;/B&gt;&lt;BR /&gt;CVE-2014-3470: EDCH is not in use, but a patch for the issue will be included&lt;BR /&gt;&lt;BR /&gt;&lt;B&gt;Fixed Releases&lt;/B&gt;&lt;BR /&gt;Upcoming: 7.4.130.0, 7.6.130.0, 8.0, 7.0.x&lt;BR /&gt;Will not be fixed: 4.x, 5.x, 6.x, 7.2.x, 7.3.x, 7.5.x (all end of engineering maintenance)&lt;BR /&gt;&lt;BR /&gt;Fixed code will be posted in CCO soon. For beta access contact wnbu-mrbeta@external.cisco.com&lt;BR /&gt;&lt;BR /&gt;&lt;B&gt;PSIRT Evaluation:&lt;/B&gt;&lt;BR /&gt;The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 7.8/7.5:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://intellishield.cisco.com/security/alertmanager/cvss?target=new&amp;amp;version=2.0&amp;amp;vector=AV:N/AC:L/Au:N/C:N/I:N/A:C/E:F/RL:U/RC:C" target="_blank"&gt;https://intellishield.cisco.com/security/alertmanager/cvss?target=new&amp;amp;version=2.0&amp;amp;vector=AV:N/AC:L/Au:N/C:N/I:N/A:C/E:F/RL:U/RC:C&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;The Cisco PSIRT has assigned this score based on information obtained from multiple sources. This includes the CVSS score assigned by the third-party vendor when available. The CVSS score assigned may not reflect the actual impact on the Cisco Product.&lt;BR /&gt;&lt;BR /&gt;Additional information on Cisco's security vulnerability policy can be found at the following URL:&lt;BR /&gt;&lt;BR /&gt;http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV class="currentRatingDesc"&gt;&lt;DIV id="cdetsButton" style="width:100%;padding-top:6px;clear:both;"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;</description>
      <pubDate>Fri, 11 Jul 2014 08:11:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/openssl-vulnerabilities-in-wlc-7-4-110-0/m-p/2493462#M6444</guid>
      <dc:creator>mohanak</dc:creator>
      <dc:date>2014-07-11T08:11:25Z</dc:date>
    </item>
    <item>
      <title>Hi, thanks for your answer.</title>
      <link>https://community.cisco.com/t5/wireless/openssl-vulnerabilities-in-wlc-7-4-110-0/m-p/2493463#M6445</link>
      <description>&lt;P&gt;Hi, thanks for your answer. Do you know approximately when 7.6.130.0 will be released? Because I'll have to upgrade WLC anyway and if the release will be out soon, I would wait for it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;KR&lt;/P&gt;</description>
      <pubDate>Thu, 24 Jul 2014 12:14:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/openssl-vulnerabilities-in-wlc-7-4-110-0/m-p/2493463#M6445</guid>
      <dc:creator>Rene S.</dc:creator>
      <dc:date>2014-07-24T12:14:37Z</dc:date>
    </item>
    <item>
      <title>As far as I know it will be</title>
      <link>https://community.cisco.com/t5/wireless/openssl-vulnerabilities-in-wlc-7-4-110-0/m-p/2493464#M6446</link>
      <description>&lt;P&gt;As far as I know it will be released by mid August. Let's wait &amp;amp; see&amp;nbsp;&lt;IMG alt="smiley" height="23" src="https://supportforums.cisco.com/profiles/commons/libraries/ckeditor/plugins/smiley/images/regular_smile.png" title="smiley" width="23" /&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;Rasika&lt;/P&gt;&lt;P&gt;**** Pls rate all useful responses ****&lt;/P&gt;</description>
      <pubDate>Thu, 24 Jul 2014 22:53:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/openssl-vulnerabilities-in-wlc-7-4-110-0/m-p/2493464#M6446</guid>
      <dc:creator>Rasika Nayanajith</dc:creator>
      <dc:date>2014-07-24T22:53:23Z</dc:date>
    </item>
    <item>
      <title>Is 7.4.121.0 affected or not</title>
      <link>https://community.cisco.com/t5/wireless/openssl-vulnerabilities-in-wlc-7-4-110-0/m-p/2493465#M6447</link>
      <description>&lt;P&gt;Is 7.4.121.0 affected or not?&lt;/P&gt;&lt;P&gt;I can see that 7.4.120.0 is affected and that the fix will be in 7.4.130.0 but no mentioning of 7.4.121.0.&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Frank&lt;/P&gt;</description>
      <pubDate>Tue, 05 Aug 2014 13:25:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/openssl-vulnerabilities-in-wlc-7-4-110-0/m-p/2493465#M6447</guid>
      <dc:creator>frankpetersatt</dc:creator>
      <dc:date>2014-08-05T13:25:56Z</dc:date>
    </item>
  </channel>
</rss>

