06-03-2024 01:01 AM
Dear We are looking to fix this vulnerability CVE-2017-9798
But the condition is using the default configuration , which configuration that should be checked to validate if we are infected or not
06-08-2024 07:52 PM - edited 06-08-2024 07:54 PM
From everything i could see this only seems to be on FXOS so if you are using a firepower firewall, then it looks like a possibility. what they mean by "default" is that in the base factory config, the vulnerability is there..
you can also contact PSIRT (Cisco Product Security Incident Response Team) PSIRT link and ask for confirmation or open a TAC case.. and they will get back to you..
here are the associated bug details:
CSCvi84381
https://bst.cisco.com/quickview/bug/CSCvi84381
which is a duplicate of
12-23-2024 10:27 PM
@khalilruziah wrote:Dear We are looking to fix this vulnerability CVE-2017-9798
But the condition is using the default configuration , which configuration that should be checked to validate if we are infected or not
To validate if you are infected with CVE-2017-9798, you should check the following configurations:
Limit
directive or options that might allow the use of unrecognized HTTP methods.
By examining these configurations, you can determine if your system is vulnerable to CVE-2017-9798 and take appropriate mitigation steps.
And remember specific configurations to check may vary slightly depending on your apache version and operating system. If you are unsure about modifying server configurations consult with a qualified system administrator.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide