12-04-2012 09:33 AM - edited 02-21-2020 04:47 AM
Hi networkers,
I recently run a pentest against a 2911 router. It mentioned the following message:
[quote]Vulnerability allows remote attackers to force the downgrade to an unintended cipher.
[/quote]
03-21-2013 09:56 AM
Wass,
When an IOS image is released, it is linked to a single OpenSSL version. If there is a specific IOS image you are concerned with, provide Cisco with the exact IOS image name, and we can return the OpenSSL version for that image to you.
However, if you are trying to find the OpenSSL version for an ASA (Adaptive Security Appliance), you can determine this version from the ASA release notes. Simply examine the "Open Source" notes that are located in the release notes of the particular ASA image you are concerned with. For example, from the ASA 8.4 release notes, you will find a section titled "Related Documentation", which has a link that points to "ASA Series Documentation". From there, you will find a link for "Open Source License". That will take you to an "Open Source" page which reveals that the OpenSSL version that runs on the ASA 8.4 code is "0.9.8f"
As a side note, you can determine the OpenSSL version running on a "client" computer by issuing the "ssh -v" command. For example, on my own Mac we can see that I'm running OpenSSL version 0.9.8r.
mveedock-mac:~ mikeveedock$ ssh -v cisco@10.1.1.1
OpenSSH_5.2p1, OpenSSL 0.9.8r 8 Feb 2011
Hope this helps!
--
Mike Veedock
VPN Engineer – Cisco Systems
08-23-2017 01:41 AM
what version of openSSL is used in c880data-universalk9-mz.152-4.M5.bin?
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide