07-31-2024 04:57 PM - edited 07-31-2024 05:53 PM
Hi folks,
Our vulnerability scanning tool has picked up couple of OpenSSH related vulnerability in all our 9000 series switch. See attached screenshot.
I checked for any related post online but I couldn't find anything, even though there are some related, they are from different cisco products.
So far, I have applied the following configs below I came across online but that hasn't fix the problem. After I ran the remediation scan I can see that the vulnerabilities are still there.
DR-CORE-SW-STACK#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
DR-CORE-SW-STACK(config)#crypto key generate rsa modulus 4096 label my-4096rsa-ssh-key
% You already have RSA keys defined named my-4096rsa-ssh-key.
% They will be replaced.
% The key modulus size is 4096 bits
% Generating 4096 bit RSA keys, keys will be non-exportable...
[OK] (elapsed time was 2 seconds)
DR-CORE-SW-STACK(config)#ip ssh rsa keypair-name my-4096rsa-ssh-key
DR-CORE-SW-STACK(config)#ip ssh version 2
DR-CORE-SW-STACK(config)#ip ssh server algorithm authentication keyboard
DR-CORE-SW-STACK(config)#ip ssh server algorithm kex ecdh-sha2-nistp521 ecdh-sha2-nistp384
DR-CORE-SW-STACK(config)#ip ssh server algorithm hostkey rsa-sha2-512 rsa-sha2-256
DR-CORE-SW-STACK(config)#ip ssh server algorithm encryption aes256-gcm aes256-ctr
DR-CORE-SW-STACK(config)#ip ssh server algorithm mac hmac-sha2-512 hmac-sha2-256
DR-CORE-SW-STACK(config)#ip ssh server algorithm publickey ecdsa-sha2-nistp521 ecdsa-sha2-nistp384
DR-CORE-SW-STACK(config)#do wri
Building configuration...
[OK]
DR-CORE-SW-STACK(config)#
How can I remove these vulnerabilities, any good folks want to help?
I really appreciate your help on this.
Thank you,
Kevin
07-31-2024 06:10 PM
Hi
Are you sure the scanning was ran against a Cisco switch, I dont recall cisco device using OpenSSH
On the link below there are planty of tips related to strong SSH, hope that can help you
07-31-2024 07:31 PM
Hi Flavio,
I did came across this site and use the configs above however, the issue still persist when I ran the scan.
07-31-2024 11:08 PM
Hello Kevin,
I do not see any SSH related vulnerability in your configuration. It looks good.
I am also using same configuration. What version you are using in Switch?
C9300-01#sh ip ssh
SSH Enabled - version 2.0
Authentication methods:keyboard-interactive
Authentication Publickey Algorithms:ecdsa-sha2-nistp256,ecdsa-sha2-nistp384
Hostkey Algorithms:rsa-sha2-512,rsa-sha2-256
Encryption Algorithms:aes256-ctr
MAC Algorithms:hmac-sha2-256,hmac-sha2-512
KEX Algorithms:ecdh-sha2-nistp521
Authentication timeout: 60 secs; Authentication retries: 5
Minimum expected Diffie Hellman key size : 2048 bits
IOS Keys in SECSH format(ssh-rsa, base64 encoded): TP-self-signed-2962435495
Modulus Size : 2048 bits
08-01-2024 04:51 AM
I'm wondering if your acan is not sending out common vulnerability for SSH and not actually seing it on the Switch because it show OpenSSH which I dont believe Cisco use it.
Is this an oficial scan tool or some free software?
08-01-2024 09:57 AM
please share
show ip ssh
I think there are other cipher use by default
MHM
08-10-2024 11:38 PM
IOS-XE only is affected by regreSSion vulnernability if the platform has NETCONF enabled AND running vulnerable version (fixed from 17.15.1).
If NETCONF is not enabled, the IOS-XE is not affected.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide