01-14-2019 05:22 AM - edited 03-08-2019 05:01 PM
Hi All,
I've detected that one of our devices is affected by a vunerability [https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170214-smi] whereby Smart Install client is exploted. Our code version does not allow us to do a 'no vstack' to disable the feature.
Other than the ACL workaround how can I verify what future code versions offer the ability to disable the feature if we were to upgrade? To conclude I'm looking on how one would check for a future code version that allows us to turn off or the Smart install is disabled!
Many Thanks
George
Solved! Go to Solution.
01-14-2019 05:58 AM
01-14-2019 05:37 AM - edited 01-14-2019 05:46 AM
Hi
You would need to check the command output for that specific IOS version on the Cisco website or post the version your going to use and see if someone is running it already and can confirm ,eacxh IOS has a linked command output guide by alphabetical order , you could confirm there if the command is present in that code to disable
out of interest which version are you on as we disabled this on all our IOS-XE devices last year without issue
also did you check its not already disabled by default in show run all | i vstack
EDIT : if you cant turn it off it cant be on usually , are you sure this specific version is effected ?
01-14-2019 05:49 AM
Thanks for your reply.
Code version - 03.08.02.E
It is defintley enabled unforuntaely.
#show vstack config Role: Client (SmartInstall enabled)
Even if we knew when the command was added that would be of use!
01-14-2019 05:58 AM
01-14-2019 06:53 AM
01-14-2019 09:56 PM
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide