cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
788
Views
1
Helpful
6
Replies

Cisco USC Nessus non-credentialed scans

JEMS
Level 1
Level 1

I’m currently trying to scan Cisco UCS devices using Nessus Scanner but I’m keep getting non-authenticated scans. Under the scan results I cannot find the Plugin ID 110095, shows as no data. I was able to scan these devices with authenticated scans back to February prior a Firmware update, wondering if the "key exchange algorithms" that Cisco UCS is currently using is no longer supported by the Nessus Scanner. I’m currently getting Intermittent Authentication Failure under Plugin ID 117885, It shows 4 connection timed out or was dropped during key exchange. Please if anybody have any idea will be great and highly appreciated. Thanks.

6 Replies 6

As this has nothing to do with Collaboration, but is related to Data Center, I’ll help you out and move your post into that part of the community.



Response Signature


Steven Tardy
Cisco Employee
Cisco Employee

What model (PID) UCS device?
What version (firmware) is on the UCS device?

Could be UCS is old SSH and Nessus is new SSH or vice versa.
This is a semi-common scenario as SSH versions / ciphers / kex / etc change over time and older "insecure" combinations are retired.

If UCS is up to date, then that would be a Nessus problem to fix.
If UCS is old, then upgrading UCS may allow Nessus to connect.

Hi, I'm using the following specs

Model: UCS-FI-6332-16UP-U

Firmware Version: 4.2.2d

I was thinking if the algorithm that the UCS devices are using are not longer compatible with Nessus, because I was able to get credentials scans back to February before we update the firmware. Please let me know what do you think about this, thanks.

Kirk J
Cisco Employee
Cisco Employee

I've had a couple of customers have issues with older versions of putty connecting to newer UCSM versions for the reason's Steve's already mentioned (older ciphers being retired), and resolved with newer version of putty.

As UCSM isn't created for "Nessus" functionality, I'd say it's up to Nessus to have up to date ciphers.

UCSM not responding to Nessus isn't a bad thing from UCSM security perspective ; )

Kirk...

JEMS
Level 1
Level 1

Hi there and thanks for the input.

Is there a link that contains details about the latest firmware udpate improvements? So I find the specific updated protocol and submit this as final explanation/confirmation. Thank you.

Kirk J
Cisco Employee
Cisco Employee

General release notes: https://www.cisco.com/c/en/us/td/docs/unified_computing/ucs/release/notes/cisco-ucs-manager-rn-4-2.html

From a wireshark capture for SSH negotiation with a UCSM running 4.22e
diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,!ssh-rsa,rsa-sha2-256,rsa-sha2-512 aes128-ctr,aes192-ctr,aes256-ctr aes128-ctr,aes192-ctr,aes256-ctrhmac-sha2-256,hmac-sha2-512,hmac-sha2-256,hmac-sha2-512,none,zlib@openssh.comnone,zlib@openssh.com

CiscoSSH 1.8.23, OpenSSH_8.0p1, CiscoSSL 1.1.1l.7.2.289-fips

Kirk...

Review Cisco Networking products for a $25 gift card