<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic RE: Heartbleed OpenSSL Vulnerability in NMS/Oneview or Wireless Controller in ExtremeSwitching (EXOS/Switch Engine)</title>
    <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/heartbleed-openssl-vulnerability-in-nms-oneview-or-wireless/m-p/45835#M11516</link>
    <description>See also, in the FAQ section of this forum:&lt;BR /&gt;
16131, "Extreme Networks Response to US-CERT Vulnerability Advisory VU#720951" (&lt;A href="http://bit.ly/1n6cUcI)" target="_blank" rel="nofollow noreferrer noopener"&gt;http://bit.ly/1n6cUcI)&lt;/A&gt;.</description>
    <pubDate>Mon, 14 Apr 2014 23:45:00 GMT</pubDate>
    <dc:creator>Paul_Poyant</dc:creator>
    <dc:date>2014-04-14T23:45:00Z</dc:date>
    <item>
      <title>Heartbleed OpenSSL Vulnerability in NMS/Oneview or Wireless Controller</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/heartbleed-openssl-vulnerability-in-nms-oneview-or-wireless/m-p/45831#M11512</link>
      <description>Are NMS/Oneview, or the wireless controller at risk of the Heartbleed OpenSSL vulnerability?  What revision levels are at risk?   Is there a corporate statement of exposure risk and mitigation?&lt;BR /&gt;
See similar post about XOS.&lt;BR /&gt;
&lt;A href="https://community.extremenetworks.com/extreme/topics/heartbleed_openssl_vulnerability" target="_blank" rel="nofollow noreferrer noopener"&gt;https://community.extremenetworks.com/extreme/topics/heartbleed_openssl_vulnerability&lt;/A&gt;&lt;BR /&gt;</description>
      <pubDate>Thu, 10 Apr 2014 03:34:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/heartbleed-openssl-vulnerability-in-nms-oneview-or-wireless/m-p/45831#M11512</guid>
      <dc:creator>Skowronek__Kurt</dc:creator>
      <dc:date>2014-04-10T03:34:00Z</dc:date>
    </item>
    <item>
      <title>RE: Heartbleed OpenSSL Vulnerability in NMS/Oneview or Wireless Controller</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/heartbleed-openssl-vulnerability-in-nms-oneview-or-wireless/m-p/45832#M11513</link>
      <description>Netsite 5.0.0.231 &lt;BR /&gt;
SIEM &lt;B&gt;7.7.2 Patch 1 (Build 614901 (7.2.0.614901))&lt;BR /&gt;
&lt;/B&gt;use libssl.so.1.0.0.  &lt;BR /&gt;
&lt;BR /&gt;
NAC Gateway 5.0.0.231&lt;BR /&gt;
uses libssl.so 0.9.8&lt;BR /&gt;
&lt;BR /&gt;
So it looks like those versions are not vulnerable.&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Thu, 10 Apr 2014 17:01:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/heartbleed-openssl-vulnerability-in-nms-oneview-or-wireless/m-p/45832#M11513</guid>
      <dc:creator>Jeff_Creek</dc:creator>
      <dc:date>2014-04-10T17:01:00Z</dc:date>
    </item>
    <item>
      <title>RE: Heartbleed OpenSSL Vulnerability in NMS/Oneview or Wireless Controller</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/heartbleed-openssl-vulnerability-in-nms-oneview-or-wireless/m-p/45833#M11514</link>
      <description>Hello Kurt&lt;BR /&gt;
&lt;BR /&gt;
We will be publishing a formal document on what products are vulnerable and when they will be fixed in the next day or so.&lt;BR /&gt;
&lt;BR /&gt;
Thanks&lt;BR /&gt;
P&lt;BR /&gt;</description>
      <pubDate>Thu, 10 Apr 2014 18:17:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/heartbleed-openssl-vulnerability-in-nms-oneview-or-wireless/m-p/45833#M11514</guid>
      <dc:creator>Paul_Russo</dc:creator>
      <dc:date>2014-04-10T18:17:00Z</dc:date>
    </item>
    <item>
      <title>RE: Heartbleed OpenSSL Vulnerability in NMS/Oneview or Wireless Controller</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/heartbleed-openssl-vulnerability-in-nms-oneview-or-wireless/m-p/45834#M11515</link>
      <description>Hi&lt;BR /&gt;
&lt;BR /&gt;
The  version of OpenSSL used on the controller and legacy AP models i.e. 26xx &amp;amp; 36xx does not contain (or  need) the functionality that is vulnerable to heartbleed.&lt;BR /&gt;
&lt;BR /&gt;
The version of  OpenSSL on the 37xx and 38xx series APs is custom built without the functionality  that is vulnerable to heartbleed.&lt;BR /&gt;
&lt;BR /&gt;
So no risk for IdentiFi products due to this vulnerability.&lt;BR /&gt;
&lt;BR /&gt;
Thanks&lt;BR /&gt;
Arun</description>
      <pubDate>Thu, 10 Apr 2014 20:54:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/heartbleed-openssl-vulnerability-in-nms-oneview-or-wireless/m-p/45834#M11515</guid>
      <dc:creator>Arun_Solleti</dc:creator>
      <dc:date>2014-04-10T20:54:00Z</dc:date>
    </item>
    <item>
      <title>RE: Heartbleed OpenSSL Vulnerability in NMS/Oneview or Wireless Controller</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/heartbleed-openssl-vulnerability-in-nms-oneview-or-wireless/m-p/45835#M11516</link>
      <description>See also, in the FAQ section of this forum:&lt;BR /&gt;
16131, "Extreme Networks Response to US-CERT Vulnerability Advisory VU#720951" (&lt;A href="http://bit.ly/1n6cUcI)" target="_blank" rel="nofollow noreferrer noopener"&gt;http://bit.ly/1n6cUcI)&lt;/A&gt;.</description>
      <pubDate>Mon, 14 Apr 2014 23:45:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/heartbleed-openssl-vulnerability-in-nms-oneview-or-wireless/m-p/45835#M11516</guid>
      <dc:creator>Paul_Poyant</dc:creator>
      <dc:date>2014-04-14T23:45:00Z</dc:date>
    </item>
  </channel>
</rss>

