2953
Views
0
Helpful
1
Replies
Overcoming “diffie-hellman-group1-sha1“ vulnerability in the SSH
Options
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-05-2016 12:11 PM - edited 03-05-2019 03:16 AM
Dear Experts,
We currently have Cisco 3925E router and using (C3900e-UNIVERSALK9-M), Version 15.1(3)T2, RELEASE SOFTWARE (fc1). In order to pass PCI DSS metrics we need to pass their vulnerability test and nmap scan is showing “diffie-hellman-group1-sha1“ vulnerability in the SSH (output below)
nmap -Pn xx.xx.xx.xx --script ssh2-enum-algos -p 22
Starting Nmap 5.51 ( http://nmap.org ) at 2015-12-16 11:05 GMT
Nmap scan report for (xx.xx.xx.xx)
Host is up (0.062s latency).
PORT STATE SERVICE
22/tcp open ssh
| ssh2-enum-algos:
| kex_algorithms (3)
| diffie-hellman-group-exchange-sha1
| diffie-hellman-group14-sha1
| diffie-hellman-group1-sha1
...
Can you please confirm how can i resolve this vulnerability. If i have to upgrade the IOS then please specify which version should i opt. Much appreciated.
Labels:
- Labels:
-
Other Routing
1 Reply 1
Options
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
06-07-2017 04:04 PM
Hi. Have you found the solution to this ?
