cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
499
Views
0
Helpful
7
Replies

WLC3504 8.10.196.0 - TLS1.2 Uso de cifrados inseguros, CBC y SHA

victor-castillo
Level 1
Level 1

Hello good afternoon.

I have a wireless controller models 3504, with firmware version 8.10.196.0, and when it comes to pentesting, it marks the following vulnerabilities, I already applied a procedure with the following commands:

victorcastillo_0-1757471507706.pngvictorcastillo_1-1757471528344.png

likewise, I already updated the local certificate, disabled telnet, http, modified the security of my ssids, but my pentest shows vulnerabilities, does anyone know anything about it?
I found that Cisco for compatibility reasons cannot remove all RSAs.

victorcastillo_2-1757471680338.png

likewise, I thank you for your help, greetings...

 

7 Replies 7

ammahend
VIP Alumni
VIP Alumni

did you try the steps recommended in this post

its a bit old but relevant. 

-hope this helps-

Hi friend, I just took that post as a reference for the solution to my problem, but it didn't work.

Rich R
VIP
VIP

You may not like the answer but ...
https://www.cisco.com/c/en/us/products/collateral/wireless/3504-wireless-controller/eos-eol-notice-c51-744737.html
https://www.cisco.com/c/en/us/products/collateral/wireless/8500-series-wireless-controllers/wireless-software-8-10-pb.html

It's a legacy product running a legacy operating system (AireOS).  Basically if you want the latest technology, features and security standards then you need to upgrade to a more recent product like 9800 series which is IOS-XE based and therefore inherits most of the security features and standards from the IOS-XE base code.  They did "port" some things from AireOS which is not great but most of it is modern and certainly the part you're looking for has the latest standards.  And of course it is still maintained and in development so will continue to be updated and evolve with the standards for the foreseeable future.

I really appreciate your support friend

Saikat Nandy
Cisco Employee
Cisco Employee

Can you share the exact vulnerability CVE IDs? I see that you have shared the ciphers but if you can help me with the CVE IDs, I can at least check the status.

will you have a procedure to remove CVE IDs from these vulnerabilities?, likewise, I found this cve id that refers to this type of topic

CVE-2013-0169

 

I have looked CVE-2013-0169 and the only thing needed is cipher option high that I can see you have already enabled. So that should be it. 

Review Cisco Networking for a $25 gift card