<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Security Vulnerabilities in Purview devices in ExtremeCloud IQ- Site Engine Management Center</title>
    <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/security-vulnerabilities-in-purview-devices/m-p/82722#M9097</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;  &lt;P&gt;&amp;nbsp;&lt;/P&gt;  &lt;P&gt;On the SNMP topic.&lt;/P&gt;  &lt;P&gt;If you are sure you do not need SNMPv1/2c then disable it and use SNMPv3 instead!&lt;/P&gt;  &lt;P&gt;The Extreme Management Center and Engines do support SNMPv3 = configure it&lt;/P&gt;  &lt;P&gt;Extreme switches support&amp;nbsp;SNMPv3 also, configure SNMP properly to disable SNMPv1 and SNMPv2.&lt;/P&gt;</description>
    <pubDate>Thu, 28 May 2020 16:28:51 GMT</pubDate>
    <dc:creator>testpartner</dc:creator>
    <dc:date>2020-05-28T16:28:51Z</dc:date>
    <item>
      <title>Security Vulnerabilities in Purview devices</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/security-vulnerabilities-in-purview-devices/m-p/82721#M9096</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;  &lt;P&gt;we received some vulnerabilites from security´s team, these are:&lt;/P&gt;  &lt;P&gt;&amp;nbsp;&lt;/P&gt;  &lt;P&gt;SNMP Agent is configured with “public” community&lt;/P&gt;  &lt;P&gt;DDOS in SNMP “GETBULK”&lt;/P&gt;  &lt;P&gt;For both these ones we deleted all about public community in SNMP&lt;/P&gt;  &lt;P&gt;&amp;nbsp;&lt;/P&gt;  &lt;P&gt;&amp;nbsp;&lt;/P&gt;  &lt;P&gt;Server SSH CBC Cipher&amp;nbsp;Mode Enabled&lt;/P&gt;  &lt;P&gt;this is in PV Sensor but i dont now how to disable that mode.&lt;/P&gt;  &lt;P&gt;&amp;nbsp;&lt;/P&gt;  &lt;P&gt;SSL Certificate with HASH algorithm is weak&lt;/P&gt;  &lt;P&gt;I tried to generate a certificate from SO with this commmand :&lt;/P&gt;  &lt;P&gt;openssl genrsa -out CA.key 8192&lt;/P&gt;  &lt;P&gt;&amp;nbsp;&lt;/P&gt;  &lt;P&gt;application&amp;nbsp;web is&amp;nbsp;vulnerable to clickjacking&lt;/P&gt;  &lt;P&gt;the recomendation is to have the most actual SO im in Ubuntu 16.04 in 8.3 Netsight and Pureview Console, so we are planning to upgrade to 8.4&lt;/P&gt;  &lt;P&gt;&amp;nbsp;&lt;/P&gt;  &lt;PRE&gt;Authentication signature not enabled on SMB&lt;/PRE&gt;  &lt;P&gt;this is associated with Windows OS i dont know if applies in extreme application with linux.&lt;/P&gt;  &lt;P&gt;&amp;nbsp;&lt;/P&gt;  &lt;P&gt;can you help me with this o bring me some information to resolve it&lt;/P&gt;</description>
      <pubDate>Wed, 27 May 2020 19:05:28 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/security-vulnerabilities-in-purview-devices/m-p/82721#M9096</guid>
      <dc:creator>jtorresm</dc:creator>
      <dc:date>2020-05-27T19:05:28Z</dc:date>
    </item>
    <item>
      <title>Re: Security Vulnerabilities in Purview devices</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/security-vulnerabilities-in-purview-devices/m-p/82722#M9097</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;  &lt;P&gt;&amp;nbsp;&lt;/P&gt;  &lt;P&gt;On the SNMP topic.&lt;/P&gt;  &lt;P&gt;If you are sure you do not need SNMPv1/2c then disable it and use SNMPv3 instead!&lt;/P&gt;  &lt;P&gt;The Extreme Management Center and Engines do support SNMPv3 = configure it&lt;/P&gt;  &lt;P&gt;Extreme switches support&amp;nbsp;SNMPv3 also, configure SNMP properly to disable SNMPv1 and SNMPv2.&lt;/P&gt;</description>
      <pubDate>Thu, 28 May 2020 16:28:51 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/security-vulnerabilities-in-purview-devices/m-p/82722#M9097</guid>
      <dc:creator>testpartner</dc:creator>
      <dc:date>2020-05-28T16:28:51Z</dc:date>
    </item>
    <item>
      <title>Re: Security Vulnerabilities in Purview devices</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/security-vulnerabilities-in-purview-devices/m-p/82723#M9098</link>
      <description>&lt;P&gt;If you run XMC as VM then you can upgrade to XMC 8.4. It will upgrade to Ubuntu 18.04&lt;/P&gt;  &lt;P&gt;If you installed XMC on your own OS then you need to upgrade your OS by your own.&lt;/P&gt;</description>
      <pubDate>Thu, 28 May 2020 16:30:51 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/security-vulnerabilities-in-purview-devices/m-p/82723#M9098</guid>
      <dc:creator>testpartner</dc:creator>
      <dc:date>2020-05-28T16:30:51Z</dc:date>
    </item>
  </channel>
</rss>

