Start a Conversation

Unsolved

This post is more than 5 years old

K

1 Rookie

 • 

359 Posts

928

December 14th, 2015 06:00

How to mitigate sslv3 poodle vulnerability on sp ip's.

Have two NX4-A5f arrays.  Upgraded both to 6.0.71.4 which is the latest and per this KB article contains several security fixes.

https://emc--c.na5.visual.force.com/apex/KB_ESA?id=kA270000000CkJp

However after rescanning the gear with our vulnerability scanner, POODLE (SSLv3) was only mitigated on the control station IP addresses.  The Storage Processor IP's (2 for each NX4 unit) still indicate they are vulnerable to poodle.

I realize this is on the LAN, but I'm just grasping at these low vulnerabilities because every one mitigated increases our score.

February 15th, 2017 16:00

I am also looking for answer to similar issue on our VAMX SPs (windows control station), have you found any solution yet?

Thanks

8.6K Posts

February 16th, 2017 01:00

I would suggest to move your post to the VMAX / Symmetrix section of the forum

did you have a look at the knowledgebase on support.emc.com ?

No Events found!

Top