Summary Mist APs are not impacted by OpenSSH vulnerabilities as they do not use OpenSSH. Scope: Unaffected Products: Mist APs
- Getting Started
- Wireless
- Wired Switching
- WAN Edge
- Mist Access Assurance
- Location Based Services
- Premium Analytics
- Security and Cloud Administration
- MSP
- Automation
- Product Updates
- Marvis
- Security Alerts
- FAQ
Security Alerts
CVE-2024-3596 On July 9, 2024 researches announced a protocol level vulnerability in the RADIUS protocol with the ability of a man-in-the-middle attacker to spoof valid RADIUS messages. The vulnerability is referred to as BlastRADIUS and has assigned CVE-2024-3596 What is this vulnerability? CVE-2024-3596 identifies RADIUS protocol (RFC 2865) being susceptible to allow modifying of responses...
Mist-Juniper is planning to discontinue support for TLS1.1 in the Mist cloud infrastructure and will only support TLS version 1.2 and the following cipher suites: ECDHE-ECDSA-AES128-GCM-SHA256 ECDHE-RSA-AES128-GCM-SHA256 ECDHE-ECDSA-AES128-SHA256 ECDHE-RSA-AES128-SHA256 ECDHE-ECDSA-AES256-GCM-SHA384 ECDHE-RSA-AES256-GCM-SHA384 ECDHE-ECDSA-AES256-SHA384 ECDHE-RSA-AES256-SHA384 This is to ensure that we continue to provide a robust and secure cloud infrastructure. Any tools and systems accessing the Mist...