Is Pan-OS 10.1.12 susceptible to CVE-2023-51384 or CVE-2023-513845?

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Announcements
Please sign in to see details of an important advisory in our Customer Advisories area.

Is Pan-OS 10.1.12 susceptible to CVE-2023-51384 or CVE-2023-513845?

L0 Member

Is Pan-OS 10.1.12 susceptible to CVE-2023-51384 or CVE-2023-513845?

 

Our Tenable scans says it is, but I see no fix recommended for it (for any PAN-OS release).   We have updated our ciphers to remediate CVE-2023-48795 but it also still shows up on our Tenable Nessus scan.

1 REPLY 1

Community Team Member

Hi @Michael_Woods ,

 

Regarding CVE-2023-51384, Palo Alto Firewall is not affected as we do not utilise the SSH agent associated with this vulnerability.

 

I'm guessing CVE-2023-513845 is a typo on your end and you mean CVE-2023-51385 ?
As for CVE-2023-51385, we already have coverage for this vulnerability through the Unique Threat ID: 94807. This threat has been categorised with a severity level of critical and the recommended action is set to reset-both.

To validate these assertions, you may refer to the following link: https://threatvault.paloaltonetworks.com/?query=CVE-2023-51385&type=

 

Kind regards,

-Kim.

LIVEcommunity team member, CISSP
Cheers,
Kiwi
Please help out other users and “Accept as Solution” if a post helps solve your problem !

Read more about how and why to accept solutions.
  • 1062 Views
  • 1 replies
  • 0 Likes
Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!