<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>article How to address CVE-2022-37026 vulnerability in Expedition in Expedition Articles</title>
    <link>https://live.paloaltonetworks.com/t5/expedition-articles/how-to-address-cve-2022-37026-vulnerability-in-expedition/ta-p/524133</link>
    <description>&lt;DIV class="lia-message-template-symptoms-zone"&gt;
&lt;H5&gt;&lt;FONT color="#FF0000"&gt;Updated April 23, 2024: adding new repository to get erlang &amp;gt; 25+ packages&lt;/FONT&gt;&lt;/H5&gt;
&lt;H2&gt;Symptoms&lt;/H2&gt;
&lt;FONT size="3" color="#000000"&gt;Expedition is vulnerable to CVE-2022-37026, below are the&amp;nbsp;Detail about the vulnerability :&lt;/FONT&gt;&lt;/DIV&gt;
&lt;DIV class="lia-message-template-symptoms-zone"&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;In Erlang/OTP before 23.3.4.15, 24.x before 24.3.4.2, and 25.x before 25.0.2, there is a Client Authentication Bypass in certain client-certification situations for SSL, TLS, and DTLS.&lt;/SPAN&gt;&lt;/P&gt;
&lt;DIV class="row"&gt;
&lt;DIV class="col-lg-9 col-md-7 col-sm-12"&gt;
&lt;P data-testid="vuln-description"&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV class="lia-message-template-diagnosis-zone"&gt;
&lt;H2&gt;Diagnosis&lt;/H2&gt;
&lt;P&gt;Issue below command in Expedition CLI:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;$apt list --installed | grep erlang&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;the result will show erlang package is v22.x which is vulnerable to the CVE&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;
&lt;DIV class="lia-message-template-solution-zone"&gt;
&lt;H2&gt;Solution&lt;/H2&gt;
&lt;P&gt;&lt;STRONG&gt;Summary:&lt;/STRONG&gt;&amp;nbsp;Run below commands in Expedition CLI to add&amp;nbsp;new repositories and upgrade the two packages to the stated version:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;rabbitmq-server: &lt;FONT color="#0000FF"&gt;3.11.4-1&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;erlang: &lt;FONT color="#0000FF"&gt;25.0.4&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;-------------------------------------------------------------------------------------&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;//&amp;nbsp;execute below commands as root&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;STRONG&gt;&lt;SPAN class="s1"&gt;sudo -su root&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;// stop mysql service so Expedition is not available&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;STRONG&gt;&lt;SPAN class="s1"&gt;service mysql stop&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;//&amp;nbsp;remove any potential version installed&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;STRONG&gt;&lt;SPAN class="s1"&gt;apt-get remove rabbitmq-server &amp;amp;&amp;amp; apt-get purge rabbitmq-server&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;STRONG&gt;&lt;SPAN class="s1"&gt;apt-get remove erlang &amp;amp;&amp;amp; apt-get purge erlang&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;STRONG&gt;&lt;SPAN class="s1"&gt;apt autoremove&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="p1"&gt;// disable the legacy repository for erlang &amp;gt; 25+ packages&lt;/P&gt;
&lt;P class="p1"&gt;&lt;STRONG&gt;&lt;SPAN class="s1"&gt;echo "#deb &lt;A href="https://packages.erlang-solutions.com/ubuntu" target="_blank"&gt;https://packages.erlang-solutions.com/ubuntu&lt;/A&gt; focal contrib" | sudo tee /etc/apt/sources.list.d/erlang-solution.list&lt;BR /&gt;echo "#deb [trusted=yes] &lt;A href="http://www.rabbitmq.com/debian/" target="_blank"&gt;http://www.rabbitmq.com/debian/&lt;/A&gt; testing main" | sudo tee /etc/apt/sources.list.d/rabbitmq.list&lt;BR /&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;// update the apt list&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;apt update&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;// add the new repository storing&amp;nbsp;erlang &amp;gt; 25+ packages&lt;STRONG&gt;&lt;BR /&gt;add-apt-repository -y ppa:rabbitmq/rabbitmq-erlang-25&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;// update the apt list&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;apt update&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;// add the rabbitmq repository&lt;/P&gt;
&lt;P class="p1"&gt;&lt;STRONG&gt;&lt;SPAN class="s1"&gt;$curl -s &lt;A href="https://packagecloud.io/install/repositories/rabbitmq/rabbitmq-server/script.deb.sh" target="_blank" rel="noopener"&gt;https://packagecloud.io/install/repositories/rabbitmq/rabbitmq-server/script.deb.sh&lt;/A&gt; | sudo bash&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;// update the apt list&lt;BR /&gt;&lt;STRONG&gt;apt update&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;// fix any broken dependency&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;sudo apt --fix-broken install&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;// install the rabbitmq-server&lt;/P&gt;
&lt;P class="p1"&gt;&lt;STRONG&gt;&lt;SPAN class="s1"&gt;$apt-get install rabbitmq-server=3.11.4-1&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;// remove any unneeded package&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;STRONG&gt;&lt;SPAN class="s1"&gt;$apt autoremove&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;STRONG&gt;&lt;SPAN class="s1"&gt;$apt purge&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;// start the mysql service to make Expedition available&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;STRONG&gt;&lt;SPAN class="s1"&gt;$service mysql start&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Verify the two packages are updated with the required version with below commands:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;&lt;STRONG&gt;$apt list --installed | grep erlang&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;&lt;STRONG&gt;$apt list --installed | grep rabbitmq-server&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;
&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screen Shot 2022-12-14 at 9.02.49 AM.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/46156i1A0ED159A3917F69/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="Screen Shot 2022-12-14 at 9.02.49 AM.png" alt="Screen Shot 2022-12-14 at 9.02.49 AM.png" /&gt;&lt;/span&gt;
&lt;P&gt; &lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;</description>
    <pubDate>Tue, 23 Apr 2024 13:25:10 GMT</pubDate>
    <dc:creator>lychiang</dc:creator>
    <dc:date>2024-04-23T13:25:10Z</dc:date>
    <item>
      <title>How to address CVE-2022-37026 vulnerability in Expedition</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-articles/how-to-address-cve-2022-37026-vulnerability-in-expedition/ta-p/524133</link>
      <description>&lt;DIV class="lia-message-template-symptoms-zone"&gt;
&lt;H5&gt;&lt;FONT color="#FF0000"&gt;Updated April 23, 2024: adding new repository to get erlang &amp;gt; 25+ packages&lt;/FONT&gt;&lt;/H5&gt;
&lt;H2&gt;Symptoms&lt;/H2&gt;
&lt;FONT size="3" color="#000000"&gt;Expedition is vulnerable to CVE-2022-37026, below are the&amp;nbsp;Detail about the vulnerability :&lt;/FONT&gt;&lt;/DIV&gt;
&lt;DIV class="lia-message-template-symptoms-zone"&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;In Erlang/OTP before 23.3.4.15, 24.x before 24.3.4.2, and 25.x before 25.0.2, there is a Client Authentication Bypass in certain client-certification situations for SSL, TLS, and DTLS.&lt;/SPAN&gt;&lt;/P&gt;
&lt;DIV class="row"&gt;
&lt;DIV class="col-lg-9 col-md-7 col-sm-12"&gt;
&lt;P data-testid="vuln-description"&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV class="lia-message-template-diagnosis-zone"&gt;
&lt;H2&gt;Diagnosis&lt;/H2&gt;
&lt;P&gt;Issue below command in Expedition CLI:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;$apt list --installed | grep erlang&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;the result will show erlang package is v22.x which is vulnerable to the CVE&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;
&lt;DIV class="lia-message-template-solution-zone"&gt;
&lt;H2&gt;Solution&lt;/H2&gt;
&lt;P&gt;&lt;STRONG&gt;Summary:&lt;/STRONG&gt;&amp;nbsp;Run below commands in Expedition CLI to add&amp;nbsp;new repositories and upgrade the two packages to the stated version:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;rabbitmq-server: &lt;FONT color="#0000FF"&gt;3.11.4-1&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;erlang: &lt;FONT color="#0000FF"&gt;25.0.4&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;-------------------------------------------------------------------------------------&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;//&amp;nbsp;execute below commands as root&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;STRONG&gt;&lt;SPAN class="s1"&gt;sudo -su root&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;// stop mysql service so Expedition is not available&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;STRONG&gt;&lt;SPAN class="s1"&gt;service mysql stop&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;//&amp;nbsp;remove any potential version installed&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;STRONG&gt;&lt;SPAN class="s1"&gt;apt-get remove rabbitmq-server &amp;amp;&amp;amp; apt-get purge rabbitmq-server&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;STRONG&gt;&lt;SPAN class="s1"&gt;apt-get remove erlang &amp;amp;&amp;amp; apt-get purge erlang&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;STRONG&gt;&lt;SPAN class="s1"&gt;apt autoremove&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="p1"&gt;// disable the legacy repository for erlang &amp;gt; 25+ packages&lt;/P&gt;
&lt;P class="p1"&gt;&lt;STRONG&gt;&lt;SPAN class="s1"&gt;echo "#deb &lt;A href="https://packages.erlang-solutions.com/ubuntu" target="_blank"&gt;https://packages.erlang-solutions.com/ubuntu&lt;/A&gt; focal contrib" | sudo tee /etc/apt/sources.list.d/erlang-solution.list&lt;BR /&gt;echo "#deb [trusted=yes] &lt;A href="http://www.rabbitmq.com/debian/" target="_blank"&gt;http://www.rabbitmq.com/debian/&lt;/A&gt; testing main" | sudo tee /etc/apt/sources.list.d/rabbitmq.list&lt;BR /&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;// update the apt list&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;apt update&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;// add the new repository storing&amp;nbsp;erlang &amp;gt; 25+ packages&lt;STRONG&gt;&lt;BR /&gt;add-apt-repository -y ppa:rabbitmq/rabbitmq-erlang-25&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;// update the apt list&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;apt update&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;// add the rabbitmq repository&lt;/P&gt;
&lt;P class="p1"&gt;&lt;STRONG&gt;&lt;SPAN class="s1"&gt;$curl -s &lt;A href="https://packagecloud.io/install/repositories/rabbitmq/rabbitmq-server/script.deb.sh" target="_blank" rel="noopener"&gt;https://packagecloud.io/install/repositories/rabbitmq/rabbitmq-server/script.deb.sh&lt;/A&gt; | sudo bash&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;// update the apt list&lt;BR /&gt;&lt;STRONG&gt;apt update&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;// fix any broken dependency&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;sudo apt --fix-broken install&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;// install the rabbitmq-server&lt;/P&gt;
&lt;P class="p1"&gt;&lt;STRONG&gt;&lt;SPAN class="s1"&gt;$apt-get install rabbitmq-server=3.11.4-1&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;// remove any unneeded package&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;STRONG&gt;&lt;SPAN class="s1"&gt;$apt autoremove&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;STRONG&gt;&lt;SPAN class="s1"&gt;$apt purge&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;// start the mysql service to make Expedition available&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;STRONG&gt;&lt;SPAN class="s1"&gt;$service mysql start&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Verify the two packages are updated with the required version with below commands:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;&lt;STRONG&gt;$apt list --installed | grep erlang&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;&lt;STRONG&gt;$apt list --installed | grep rabbitmq-server&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;
&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screen Shot 2022-12-14 at 9.02.49 AM.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/46156i1A0ED159A3917F69/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="Screen Shot 2022-12-14 at 9.02.49 AM.png" alt="Screen Shot 2022-12-14 at 9.02.49 AM.png" /&gt;&lt;/span&gt;
&lt;P&gt; &lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;</description>
      <pubDate>Tue, 23 Apr 2024 13:25:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-articles/how-to-address-cve-2022-37026-vulnerability-in-expedition/ta-p/524133</guid>
      <dc:creator>lychiang</dc:creator>
      <dc:date>2024-04-23T13:25:10Z</dc:date>
    </item>
  </channel>
</rss>

