05-31-2017 08:50 PM - edited 03-10-2019 12:50 AM
I have NAC3315 Version 4.9.3
Our Vulnerability Assessment Founded .
Untrusted TLS/SSL server X.509 certificate (tls-untrusted-ca)
TLS/SSL Birthday attacks on 64-bit block ciphers (SWEET32) (ssl-cve-2016-2183-sweet32)
TLS/SSL Server Supports SSLv3 (sslv3-supported)
How can i fix ,Please advice me
Thanks
Solved! Go to Solution.
06-03-2017 07:45 AM
Your NAC appliance and the software running on it are end of sales now for a long time.
http://www.cisco.com/c/en/us/products/collateral/routers/7600-series-routers/eos-eol-notice-c51-734104.html
Cisco is no longer updating the software and as such there is no work around for the SWEET32 vulnerability. There is a bug ID confirming this fact:
https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvb48635
The SSLv3 issue similarly has no fix on the NAC product.
You can replace the self-signed certificate for that one bit; but overall your organization should move off of this outmoded solution to something like Cisco ISE for network access control
06-03-2017 07:45 AM
Your NAC appliance and the software running on it are end of sales now for a long time.
http://www.cisco.com/c/en/us/products/collateral/routers/7600-series-routers/eos-eol-notice-c51-734104.html
Cisco is no longer updating the software and as such there is no work around for the SWEET32 vulnerability. There is a bug ID confirming this fact:
https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvb48635
The SSLv3 issue similarly has no fix on the NAC product.
You can replace the self-signed certificate for that one bit; but overall your organization should move off of this outmoded solution to something like Cisco ISE for network access control
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide