Guest

Preview Tool

Cisco Bug: CSCup22665 - Multiple Vulnerabilities in OpenSSL - June 2014

Last Modified

Jan 19, 2018

Products (1)

  • Cisco Secure Access Control Server Solution Engine

Known Affected Releases

5.0(0.30)CTS

Description (partial)

<B>Symptom:</B>
The following Cisco Product

  Cisco Secure Access Control System (ACS)

include a version of openssl that may be affected by the vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) IDs:

CVE-2014-0224 - SSL/TLS MITM vulnerability

This bug was opened to address the potential impact on this product.The following Cisco products

<B>Conditions:</B>
Device with default configuration.

These issues are exposed via the Secure LDAP access and Secure Syslog Access interfaces.

The issues may also be exposed during CRL retrieval.

Related Community Discussions

benefits of Cisco ACS 5.7
Hi Everyone, I am currently using Cisco ACS 5.4 with patch 7  only to manage users logging into network devices (i.e. TACACS+ and radius).  Cisco just releases 5.7 on May 12th.  Any benefits to upgrade from 5.4 patch 7 to ACS 5.7? on the release notes, I see this on 5.7:  Maximum Failed Attempts Count Policy  New Sub-Attributes for Service Type RADIUS IETF Attribute  Supporting SNMP Traps for Monitoring Disk Utilization  Log Message for CLI Administrator Account Locked Out  Establishing New Connection ...
Latest activity: May 20, 2015
Bug details contain sensitive information and therefore require a Cisco.com account to be viewed.

Bug Details Include

  • Full Description (including symptoms, conditions and workarounds)
  • Status
  • Severity
  • Known Fixed Releases
  • Related Community Discussions
  • Number of Related Support Cases
Bug information is viewable for customers and partners who have a service contract. Registered users can view up to 200 bugs per month without a service contract.