08-17-2015 12:50 PM
Hi Everyone,
Scans from external vendor shows vulnerability for Diffie-Hellman < 1024 Bits (Logjam) on the VPN on our Cisco ASA running VPN.
Any idea how can i fix this on Cisco ASA 5520?
Regards
Mahesh
Solved! Go to Solution.
08-20-2015 01:06 PM
IT depends on how the scan was performed. If they are only checking your public-facing outside address then not having SSL services on it will make the vulnerability "disappear".
If you need the service off of all interfaces then you would need to upgrade so that SSL services are patched no matter what interface they are seen on.
Or you could just not patch it and accept the risk.
08-21-2015 09:27 AM
Mahesh,
"Known affected releases" usually indicates that TAC cases have been reported by customers and verified by Cisco to affect those versions.
They don't regression test every old version when a bug is discovered but usually verify the fix is in currently active release trains.
The ASA 100.x version numbers are Cisco's internal tracking numbers for code versions still in pre-release development.
08-17-2015 02:13 PM
Per this Cisco Security Advisory and the related BugID for the ASA, I believe it should be fixed in ASA software 9.1(6.7).
08-19-2015 08:38 PM
Is there any other I an fix this?
like config of Diffie Hellman on ASA?
Regards
MAhesh
08-20-2015 04:49 AM
If you don't use the ASA for SSL VPN you could disable SSL.
If you need SSL VPN, then the upgrade is the route to take. It will patch the OpenSSL library used by the ASA.
08-20-2015 07:18 AM
Hi Marvin,
We have no SSL vpn just Anyconnect with ikev2.
However we have below config
anyconnect ssl dtls enable
This is just in case if we make any change to anyconnect xml profile then users can download it.
Do you think above config will trigger the Diffie Hellman vulnerability?
Regards
Mahesh
08-20-2015 01:06 PM
IT depends on how the scan was performed. If they are only checking your public-facing outside address then not having SSL services on it will make the vulnerability "disappear".
If you need the service off of all interfaces then you would need to upgrade so that SSL services are patched no matter what interface they are seen on.
Or you could just not patch it and accept the risk.
08-21-2015 08:35 AM
Yes scan only checks public facing IP address.
I checked your link and it shows below info
Known Affected Releases: | (6) |
Known Fixed Releases: | (25) |
08-21-2015 09:27 AM
Mahesh,
"Known affected releases" usually indicates that TAC cases have been reported by customers and verified by Cisco to affect those versions.
They don't regression test every old version when a bug is discovered but usually verify the fix is in currently active release trains.
The ASA 100.x version numbers are Cisco's internal tracking numbers for code versions still in pre-release development.
08-23-2015 04:52 PM
Many thanks Marvin
Regards
Mahesh
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide