<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Vulnerability Notices || VN 2017-003 &amp; VN 2017-004 in ExtremeSwitching (EXOS/Switch Engine)</title>
    <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/vulnerability-notices-vn-2017-003-vn-2017-004/m-p/24696#M2825</link>
    <description>Extreme Networks has been made aware of a number of vulnerabilities present in its ExtremeXOS software. These vulnerabilities have been resolved in currently available releases and are described in two separate Vulnerability Notices, listed below:&lt;UL&gt; 
&lt;LI&gt;&lt;A href="https://extremeportal.force.com/ExtrArticleDetail?n=000017719" target="_blank" rel="nofollow noreferrer noopener"&gt;VN 2017-003, Local Access Control (Multiple CVEs)&lt;/A&gt; 
&lt;/LI&gt;&lt;LI&gt;&lt;A href="https://extremeportal.force.com/ExtrArticleDetail?n=000017765" target="_blank" rel="nofollow noreferrer noopener"&gt;VN 2017-004 (CVE-2017-14328, CVE-2017-14332)&lt;/A&gt;&lt;/LI&gt;&lt;/UL&gt;Customers with a current maintenance and support contract may access the Extreme Portal for software updates at: &lt;A href="https://extremeportal.force.com/" target="_blank" rel="nofollow noreferrer noopener"&gt;https://extremeportal.force.com/&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
If you have additional questions concerning this information, post a response below or contact your Extreme Networks representative.&lt;BR /&gt;
&lt;BR /&gt;
NOTE: &lt;A href="https://extremeportal.force.com/ExtrSearch?q=#t=Knowledge&amp;amp;#38;sort=relevancy&amp;amp;#38;f:@objecttypename=%5BVulnerability%20Notice%5D" target="_blank" rel="nofollow noreferrer noopener"&gt;Extreme's Vulnerability Notices&lt;/A&gt; are posted in the &lt;A href="https://extremeportal.force.com/ExtrSearch?q=" target="_blank" rel="nofollow noreferrer noopener"&gt;GTAC Knowledge&lt;/A&gt; section of the &lt;A href="https://extremeportal.force.com/" target="_blank" rel="nofollow noreferrer noopener"&gt;Extreme Portal&lt;/A&gt;.&lt;BR /&gt;
&lt;BR /&gt;</description>
    <pubDate>Thu, 16 Nov 2017 03:59:00 GMT</pubDate>
    <dc:creator>Drew_C</dc:creator>
    <dc:date>2017-11-16T03:59:00Z</dc:date>
    <item>
      <title>Vulnerability Notices || VN 2017-003 &amp; VN 2017-004</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/vulnerability-notices-vn-2017-003-vn-2017-004/m-p/24696#M2825</link>
      <description>Extreme Networks has been made aware of a number of vulnerabilities present in its ExtremeXOS software. These vulnerabilities have been resolved in currently available releases and are described in two separate Vulnerability Notices, listed below:&lt;UL&gt; 
&lt;LI&gt;&lt;A href="https://extremeportal.force.com/ExtrArticleDetail?n=000017719" target="_blank" rel="nofollow noreferrer noopener"&gt;VN 2017-003, Local Access Control (Multiple CVEs)&lt;/A&gt; 
&lt;/LI&gt;&lt;LI&gt;&lt;A href="https://extremeportal.force.com/ExtrArticleDetail?n=000017765" target="_blank" rel="nofollow noreferrer noopener"&gt;VN 2017-004 (CVE-2017-14328, CVE-2017-14332)&lt;/A&gt;&lt;/LI&gt;&lt;/UL&gt;Customers with a current maintenance and support contract may access the Extreme Portal for software updates at: &lt;A href="https://extremeportal.force.com/" target="_blank" rel="nofollow noreferrer noopener"&gt;https://extremeportal.force.com/&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
If you have additional questions concerning this information, post a response below or contact your Extreme Networks representative.&lt;BR /&gt;
&lt;BR /&gt;
NOTE: &lt;A href="https://extremeportal.force.com/ExtrSearch?q=#t=Knowledge&amp;amp;#38;sort=relevancy&amp;amp;#38;f:@objecttypename=%5BVulnerability%20Notice%5D" target="_blank" rel="nofollow noreferrer noopener"&gt;Extreme's Vulnerability Notices&lt;/A&gt; are posted in the &lt;A href="https://extremeportal.force.com/ExtrSearch?q=" target="_blank" rel="nofollow noreferrer noopener"&gt;GTAC Knowledge&lt;/A&gt; section of the &lt;A href="https://extremeportal.force.com/" target="_blank" rel="nofollow noreferrer noopener"&gt;Extreme Portal&lt;/A&gt;.&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Thu, 16 Nov 2017 03:59:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/vulnerability-notices-vn-2017-003-vn-2017-004/m-p/24696#M2825</guid>
      <dc:creator>Drew_C</dc:creator>
      <dc:date>2017-11-16T03:59:00Z</dc:date>
    </item>
    <item>
      <title>RE: Vulnerability Notices || VN 2017-003 &amp; VN 2017-004</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/vulnerability-notices-vn-2017-003-vn-2017-004/m-p/24697#M2826</link>
      <description>Hi,&lt;BR /&gt;
&lt;BR /&gt;
VN 2017-003 is a bit funny, since other vendors allow root access to the switches by default and admin privileges are needed to escalate to root.&lt;BR /&gt;
&lt;BR /&gt;
I accept that a possibility to restrict root access by configuration can be useful, as planned for addressing the "vulnerabilities."&lt;BR /&gt;
&lt;BR /&gt;
Thanks,&lt;BR /&gt;
Erik</description>
      <pubDate>Fri, 17 Nov 2017 16:47:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/vulnerability-notices-vn-2017-003-vn-2017-004/m-p/24697#M2826</guid>
      <dc:creator>Erik_Auerswald</dc:creator>
      <dc:date>2017-11-17T16:47:00Z</dc:date>
    </item>
  </channel>
</rss>

