<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>article Nominated Discussion: What Cloud Services are Affected by CVE-2020-1982? in General Articles</title>
    <link>https://live.paloaltonetworks.com/t5/general-articles/nominated-discussion-what-cloud-services-are-affected-by-cve/ta-p/557560</link>
    <description>&lt;DIV class="lia-message-template-content-zone"&gt;
&lt;P&gt;&lt;SPAN&gt;This Nominated Discussion Article is based on the post "&lt;/SPAN&gt;&lt;A href="https://live.paloaltonetworks.com/t5/general-topics/what-cloud-services-are-affected-by-cve-2020-1982/m-p/556620" target="_blank" rel="noopener"&gt;What cloud services are affected by CVE-2020-1982?&lt;/A&gt;&lt;SPAN&gt;" by&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/311720"&gt;@KyungjunCHOE&lt;/a&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;and&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;answered by&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/200155"&gt;@AKuzhuppilly&lt;/a&gt;. Read on to see his response!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;Dear Team,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When checking CVE-2020-1982 in Palo Alto Networks Security Advisories, we found the following text:&lt;/P&gt;
&lt;P&gt;&amp;gt; These cloud services include Cortex Data Lake, the Customer Support Portal, and the Prisma Access infrastructure.&lt;BR /&gt;URL : &lt;A href="https://security.paloaltonetworks.com/CVE-2020-1982" target="_blank" rel="noopener"&gt;https://security.paloaltonetworks.com/CVE-2020-1982&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The above phrase includes CSP.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So does this mean that dynamic update and software update communicated with CSP are not possible on the OS affected by that vulnerability?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I would like to know the extent to which that vulnerability is affected.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If anyone knows please share with me&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;Response:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/311720"&gt;@KyungjunCHOE&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;CVE-2020-1982 pertains to a specific issue where PAN-OS communicates with cloud-delivered services using the insecure TLS 1.0 protocol. These cloud services include Cortex Data Lake, the Customer Support Portal, and the Prisma Access infrastructure.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you check updates.paloaltonetworks.com using tools like ssllabs, you'll notice that TLS 1.0 and TLS 1.1 are enabled.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This issue has been resolved in PAN-OS versions 8.1.14, 9.0.9, 9.1.3, and all subsequent releases.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Additionally, please be aware that Palo Alto intends to discontinue support for TLS 1.0 in their cloud service endpoints on November 8, 2023. To ensure uninterrupted access to cloud-delivered services and updates, it is necessary to upgrade to PAN-OS 8.1.14, 9.0.9, 9.1.3, or newer versions.&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;</description>
    <pubDate>Thu, 18 Apr 2024 19:39:36 GMT</pubDate>
    <dc:creator>JayGolf</dc:creator>
    <dc:date>2024-04-18T19:39:36Z</dc:date>
    <item>
      <title>Nominated Discussion: What Cloud Services are Affected by CVE-2020-1982?</title>
      <link>https://live.paloaltonetworks.com/t5/general-articles/nominated-discussion-what-cloud-services-are-affected-by-cve/ta-p/557560</link>
      <description>&lt;P&gt;&lt;SPAN&gt;This Nominated Discussion Article is based on the post "&lt;/SPAN&gt;&lt;A href="https://live.paloaltonetworks.com/t5/general-topics/what-cloud-services-are-affected-by-cve-2020-1982/m-p/556620" target="_blank" rel="noopener"&gt;What cloud services are affected by CVE-2020-1982?&lt;/A&gt;&lt;SPAN&gt;".&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 18 Apr 2024 19:39:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-articles/nominated-discussion-what-cloud-services-are-affected-by-cve/ta-p/557560</guid>
      <dc:creator>JayGolf</dc:creator>
      <dc:date>2024-04-18T19:39:36Z</dc:date>
    </item>
  </channel>
</rss>

