<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Vulnerability Notice || VN 2016 002 OpenSSL in ExtremeWireless (WiNG)</title>
    <link>https://community.extremenetworks.com/t5/extremewireless-wing/vulnerability-notice-vn-2016-002-openssl/m-p/57438#M4181</link>
    <description>This vulnerability notice provides the official technical response from Extreme Networks regarding the vulnerabilities identified in OpenSSL Security Advisory published January 28, 2016.&lt;BR /&gt;
&lt;A href="https://gtacknowledge.extremenetworks.com/articles/Vulnerability_Notice/VN-2016-002-OpenSSL" target="_blank" rel="nofollow noreferrer noopener"&gt;VN-2016-002 – OpenSSL&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
As of this writing, the associated CVEs are under investigation (CVE-2016-0701 and CVE-2015-3197).&lt;BR /&gt;
&lt;BR /&gt;
Customers with a current maintenance and support contract may access the Support Portal at:  &lt;A href="http://support.extremenetworks.com/" target="_blank" rel="nofollow noreferrer noopener"&gt;http://support.extremenetworks.com/&lt;/A&gt;&lt;BR /&gt;
If you have additional questions concerning this information, please contact your Extreme Networks representative or respond to this post.&lt;BR /&gt;
&lt;BR /&gt;
NOTE: Extreme Vulnerability Notices are now posted on &lt;A href="https://gtacknowledge.extremenetworks.com/" target="_blank" rel="nofollow noreferrer noopener"&gt;GTAC Knowledge&lt;/A&gt;&lt;BR /&gt;</description>
    <pubDate>Tue, 23 Feb 2016 04:22:00 GMT</pubDate>
    <dc:creator>Drew_C</dc:creator>
    <dc:date>2016-02-23T04:22:00Z</dc:date>
    <item>
      <title>Vulnerability Notice || VN 2016 002 OpenSSL</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/vulnerability-notice-vn-2016-002-openssl/m-p/57438#M4181</link>
      <description>This vulnerability notice provides the official technical response from Extreme Networks regarding the vulnerabilities identified in OpenSSL Security Advisory published January 28, 2016.&lt;BR /&gt;
&lt;A href="https://gtacknowledge.extremenetworks.com/articles/Vulnerability_Notice/VN-2016-002-OpenSSL" target="_blank" rel="nofollow noreferrer noopener"&gt;VN-2016-002 – OpenSSL&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
As of this writing, the associated CVEs are under investigation (CVE-2016-0701 and CVE-2015-3197).&lt;BR /&gt;
&lt;BR /&gt;
Customers with a current maintenance and support contract may access the Support Portal at:  &lt;A href="http://support.extremenetworks.com/" target="_blank" rel="nofollow noreferrer noopener"&gt;http://support.extremenetworks.com/&lt;/A&gt;&lt;BR /&gt;
If you have additional questions concerning this information, please contact your Extreme Networks representative or respond to this post.&lt;BR /&gt;
&lt;BR /&gt;
NOTE: Extreme Vulnerability Notices are now posted on &lt;A href="https://gtacknowledge.extremenetworks.com/" target="_blank" rel="nofollow noreferrer noopener"&gt;GTAC Knowledge&lt;/A&gt;&lt;BR /&gt;</description>
      <pubDate>Tue, 23 Feb 2016 04:22:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/vulnerability-notice-vn-2016-002-openssl/m-p/57438#M4181</guid>
      <dc:creator>Drew_C</dc:creator>
      <dc:date>2016-02-23T04:22:00Z</dc:date>
    </item>
  </channel>
</rss>

