<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: CVE-2023-35803 mitigation ? in ExtremeWireless (IQE)</title>
    <link>https://community.extremenetworks.com/t5/extremewireless-iqe/cve-2023-35803-mitigation/m-p/96573#M1356</link>
    <description>&lt;P&gt;Hi, "Outbound" policy controls traffic sent by the Wireless Users (whatever is the destination).&lt;BR /&gt;Regards,&lt;/P&gt;</description>
    <pubDate>Tue, 25 Jul 2023 13:50:39 GMT</pubDate>
    <dc:creator>LaurentA</dc:creator>
    <dc:date>2023-07-25T13:50:39Z</dc:date>
    <item>
      <title>CVE-2023-35803 mitigation ?</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-iqe/cve-2023-35803-mitigation/m-p/96488#M1350</link>
      <description>&lt;P&gt;Hello, until we get the firmware upgraded, what sort of AP firewall policy is required to mitigate this vulnerability ? i.e inbound/outbound ? blocking port 5916 ?&lt;/P&gt;&lt;H2&gt;CVE-2023-35803&lt;/H2&gt;&lt;P&gt;Thank you kindly&lt;/P&gt;</description>
      <pubDate>Wed, 19 Jul 2023 07:43:50 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-iqe/cve-2023-35803-mitigation/m-p/96488#M1350</guid>
      <dc:creator>fran1942</dc:creator>
      <dc:date>2023-07-19T07:43:50Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2023-35803 mitigation ?</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-iqe/cve-2023-35803-mitigation/m-p/96492#M1351</link>
      <description>&lt;P&gt;For anyone who missed it here is the CVE announcement - &lt;A href="https://community.extremenetworks.com/t5/security-advisories-formerly/sa-2023-067-iq-engine-acsd-service-buffer-overflow-cve-2023/ba-p/96472" target="_blank"&gt;https://community.extremenetworks.com/t5/security-advisories-formerly/sa-2023-067-iq-engine-acsd-service-buffer-overflow-cve-2023/ba-p/96472&lt;/A&gt;&lt;/P&gt;&lt;P&gt;I too would like to know a few more details about this CVE.&lt;/P&gt;&lt;P&gt;The other &lt;A href="https://community.extremenetworks.com/t5/security-advisories-formerly/sa-2023-066-iq-engine-capwap-buffer-overflow-cve-2023-35802/ba-p/96471" target="_self"&gt;CVE&lt;/A&gt; posted Monday specifies what access is needed to conduct the exploit. I'm not seeing that information for this one which seems like very relevant information given that there are so many AP models that won't be seeing a patch for this for at least 3 months or more!&lt;/P&gt;</description>
      <pubDate>Wed, 19 Jul 2023 13:01:34 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-iqe/cve-2023-35803-mitigation/m-p/96492#M1351</guid>
      <dc:creator>w1f1n00b</dc:creator>
      <dc:date>2023-07-19T13:01:34Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2023-35803 mitigation ?</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-iqe/cve-2023-35803-mitigation/m-p/96505#M1352</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;According to the researcher Blog and Exploit code, the attacker needs to connect to the AP over the port TCP/5916.&lt;BR /&gt;A quick workaround should be to block this port to anyone (using Firewall in User-Profiles for Wi-Fi users, and using classic LAN segmentation for the wired users).&lt;BR /&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Thu, 20 Jul 2023 12:08:25 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-iqe/cve-2023-35803-mitigation/m-p/96505#M1352</guid>
      <dc:creator>LaurentA</dc:creator>
      <dc:date>2023-07-20T12:08:25Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2023-35803 mitigation ?</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-iqe/cve-2023-35803-mitigation/m-p/96546#M1353</link>
      <description>&lt;P&gt;thank you. Would that be an inbound or outbound policy to block TCP 5916 ?&lt;/P&gt;</description>
      <pubDate>Sun, 23 Jul 2023 22:11:27 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-iqe/cve-2023-35803-mitigation/m-p/96546#M1353</guid>
      <dc:creator>fran1942</dc:creator>
      <dc:date>2023-07-23T22:11:27Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2023-35803 mitigation ?</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-iqe/cve-2023-35803-mitigation/m-p/96553#M1354</link>
      <description>&lt;P&gt;Hi,&lt;BR /&gt;In all your Wireless User-Profiles&amp;nbsp; in Firewall "Outbound Policy" you should block connection to TCP/5916 port by creating a "Deny" rule on top.&lt;BR /&gt;This will prevent attack from Wireless Users (for the Wired one, rely on your corporate firewall, as long as the AP are in an isolated network).&lt;BR /&gt;To ensure the port is not reachable anymore, you can use Microsoft Powershell "Test-NetConnection" commandlet.&lt;BR /&gt;Example, if your Access Point IP address is 10.0.0.10, you can use the following powershell command :&lt;BR /&gt;tnc 10.0.0.10 -port 5916&lt;BR /&gt;&lt;SPAN&gt;The "TcpTestSucceeded" result should be "false".&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Regards,&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 24 Jul 2023 14:02:28 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-iqe/cve-2023-35803-mitigation/m-p/96553#M1354</guid>
      <dc:creator>LaurentA</dc:creator>
      <dc:date>2023-07-24T14:02:28Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2023-35803 mitigation ?</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-iqe/cve-2023-35803-mitigation/m-p/96556#M1355</link>
      <description>&lt;P&gt;thank you. So an 'outbound' policy controls traffic coming into the AP from wireless users ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 24 Jul 2023 20:25:51 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-iqe/cve-2023-35803-mitigation/m-p/96556#M1355</guid>
      <dc:creator>fran1942</dc:creator>
      <dc:date>2023-07-24T20:25:51Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2023-35803 mitigation ?</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-iqe/cve-2023-35803-mitigation/m-p/96573#M1356</link>
      <description>&lt;P&gt;Hi, "Outbound" policy controls traffic sent by the Wireless Users (whatever is the destination).&lt;BR /&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Tue, 25 Jul 2023 13:50:39 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-iqe/cve-2023-35803-mitigation/m-p/96573#M1356</guid>
      <dc:creator>LaurentA</dc:creator>
      <dc:date>2023-07-25T13:50:39Z</dc:date>
    </item>
  </channel>
</rss>

