09-10-2019 07:43 AM
We have two 4351 ISRs that were running Everest 16.6.5 IOS that a security scan showed had this vulnerability even without the REST API being installed and activated. We upgraded to the referenced fixed IOS 16.6.6 however our scans still show this vulnerability active. Any thoughts?
Solved! Go to Solution.
09-11-2019 11:45 PM
09-11-2019 12:06 AM
09-11-2019 07:14 AM
We never installed/configured the REST API so the command isn't available. However Nessus is still being triggered on this vulnerability. Unfortunately Nessus doesn't show an output for what criteria is matching for this vulnerability. It even shows the IOS version 16.6.6 which in the Bug Report is listed as a fixed version.
XXXXXXX#show v?
vasi version vlan vlan-autoconfig
vlan-range vlans vmi vnet
vpdn vrf vrrp vrrs
vtemplate vtp
XXXXXXX#show vir?
% Unrecognized command
09-11-2019 11:45 PM
09-12-2019 07:15 AM
That's what I was hoping.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide