Guest

Preview Tool

Cisco Bug: CSCuq57326 - Update to OpenSSL 1.0.1i

Last Modified

Jun 20, 2016

Products (1)

  • Cisco Network Registrar

Known Affected Releases

8.1(3.1) 8.2 8.2(0.2)

Description (partial)

Symptom:
Cisco Prime Network Registrar (CPNR) includes a version of openssl that is affected by the
vulnerabilities identified by the Common Vulnerability and Exposures (CVE) IDs: 
CVE-2014-3508, CVE-2014-5139, CVE-2014-3509, CVE-2014-3505, CVE-2014-3506, CVE-2014-3507, CVE-2014-3510, CVE-2014-3511, CVE-
2014-3512

This bug has been opened to address the potential impact on this product.

Conditions:
Investigation indicates that only:
CVE-2014-3511 - OpenSSL TLS protocol downgrade attack, affects CPNR.

This affects Cisco Prime Network Registrar version 8.X when at least one of the following is true:
- Inter cluster communication is configured for SSL security.
- Web UI access is configured for HTTPS.
- Single Sign On is configured for HTTPS.

This product is only affected by this vulnerability when it is configured to use SSL or HTTPS
for communications. Inter cluster communication and SSO uses IP addresses (not domain names)
making it more difficult to set up a man-in-the-middle. The web UI is only intended for
internal use within an organizations management network, not for the public internet, so it
should be easier to protect the system from a MITM attack.

Release 8.1.x - first fixed release is 8.1.3.3
Release 8.2.x - first fixed release is 8.2.2
Bug details contain sensitive information and therefore require a Cisco.com account to be viewed.

Bug Details Include

  • Full Description (including symptoms, conditions and workarounds)
  • Status
  • Severity
  • Known Fixed Releases
  • Related Community Discussions
  • Number of Related Support Cases
Bug information is viewable for customers and partners who have a service contract. Registered users can view up to 200 bugs per month without a service contract.