Security Alerts

OpenSSH on Mist APs

Summary  Mist APs are not impacted by OpenSSH vulnerabilities as they do not use OpenSSH. Scope: Unaffected Products: Mist APs

RADIUS Protocol Vulnerability (Blast-RADIUS)

CVE-2024-3596 On July 9, 2024 researches announced a protocol level vulnerability in the RADIUS protocol with the ability of a man-in-the-middle attacker to spoof valid RADIUS messages.  The vulnerability is referred to as BlastRADIUS and has assigned CVE-2024-3596 What is this vulnerability? CVE-2024-3596 identifies RADIUS protocol (RFC 2865) being susceptible to allow modifying of responses...

Transitioning from TLS 1.1/1.2 to TLS 1.2-Only

Mist-Juniper is planning to discontinue support for TLS1.1 in the Mist cloud infrastructure and will only support TLS version 1.2 and the following cipher suites: ECDHE-ECDSA-AES128-GCM-SHA256 ECDHE-RSA-AES128-GCM-SHA256 ECDHE-ECDSA-AES128-SHA256 ECDHE-RSA-AES128-SHA256 ECDHE-ECDSA-AES256-GCM-SHA384 ECDHE-RSA-AES256-GCM-SHA384 ECDHE-ECDSA-AES256-SHA384 ECDHE-RSA-AES256-SHA384 This is to ensure that we continue to provide a robust and secure cloud infrastructure. Any tools and systems accessing the Mist...