<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SSL certificate vulnerabilities on wireless controller C5210 in ExtremeWireless (Identifi)</title>
    <link>https://community.extremenetworks.com/t5/extremewireless-identifi/ssl-certificate-vulnerabilities-on-wireless-controller-c5210/m-p/70684#M6868</link>
    <description>&lt;P&gt;very easy…&amp;nbsp;replace the selfsigned cert with a public cert or a company pki cert&lt;/P&gt;</description>
    <pubDate>Sun, 19 Apr 2020 18:26:14 GMT</pubDate>
    <dc:creator>PeterK</dc:creator>
    <dc:date>2020-04-19T18:26:14Z</dc:date>
    <item>
      <title>SSL certificate vulnerabilities on wireless controller C5210</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-identifi/ssl-certificate-vulnerabilities-on-wireless-controller-c5210/m-p/70683#M6867</link>
      <description>&lt;P&gt;We were reported about a list of SSL certificate issues on the wireless controller C5210 :&lt;/P&gt; &lt;P&gt;&lt;BR /&gt; 1) SSL Certificate - Self-Signed Certificate Port 443&lt;BR /&gt; 2) SSL Certificate - Subject Common Name Does Not Match Server FQDN Port 443&lt;BR /&gt; 3) SSL Certificate - Signature Verification Failed Vulnerability Port 443&lt;BR /&gt; 4) SSL Certificate - Invalid Maximum Validity Date Detected Port 443&lt;/P&gt; &lt;P&gt;&amp;nbsp;&lt;/P&gt; &lt;P&gt;Some ideas for to mitigate these vulnerabilities ?&lt;/P&gt; &lt;P&gt;Thanks and best regards!&lt;/P&gt;</description>
      <pubDate>Sun, 19 Apr 2020 01:07:43 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-identifi/ssl-certificate-vulnerabilities-on-wireless-controller-c5210/m-p/70683#M6867</guid>
      <dc:creator>aguerrero</dc:creator>
      <dc:date>2020-04-19T01:07:43Z</dc:date>
    </item>
    <item>
      <title>Re: SSL certificate vulnerabilities on wireless controller C5210</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-identifi/ssl-certificate-vulnerabilities-on-wireless-controller-c5210/m-p/70684#M6868</link>
      <description>&lt;P&gt;very easy…&amp;nbsp;replace the selfsigned cert with a public cert or a company pki cert&lt;/P&gt;</description>
      <pubDate>Sun, 19 Apr 2020 18:26:14 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-identifi/ssl-certificate-vulnerabilities-on-wireless-controller-c5210/m-p/70684#M6868</guid>
      <dc:creator>PeterK</dc:creator>
      <dc:date>2020-04-19T18:26:14Z</dc:date>
    </item>
  </channel>
</rss>

