<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Info about the vulnerabilities and the possible remediations for them. in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/info-about-the-vulnerabilities-and-the-possible-remediations-for/m-p/563388#M2017</link>
    <description>&lt;P&gt;Dear All,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I hope you could help me with the query I could not find answer.&lt;/P&gt;
&lt;P&gt;The customer is asking for the remediation of the detected vulnerabilities, which I've already researched and found some info about that I've grouped below:&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;Client Side Testing - OTG-CLIENT-004 - Testing for Client Side URL Redirect &lt;/STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;------------------------------------------------------------------------------------------------------------------------&lt;BR /&gt;[P3: Medium] OTG-CLIENT-004: External redirect via host header injection.&lt;BR /&gt;*I found the below conversations form the Live community about it:&lt;BR /&gt;&lt;A href="https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-redirection-via-arbitrary-host-header/td-p/559138" target="_self"&gt;&lt;SPAN&gt;Global Protect - Redirection via Arbitrary Host Header Manipulation&lt;/SPAN&gt;&lt;/A&gt;&lt;BR /&gt;&lt;A href="https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-qualys-150307-external-service-interaction-via/td-p/432405" target="_self"&gt;&lt;SPAN&gt;GlobalProtect Qualys: 150307 External Service interaction via Host Header Injection&lt;/SPAN&gt;&lt;/A&gt;&lt;BR /&gt;------------------------------------------------------------------------------------------------------------------------&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;Cryptography - OTG-CRYPST-001 - Testing for Weak SSL/TSL Ciphers, Insufficient Transport Layer Protection&lt;/STRONG&gt;&lt;BR /&gt;------------------------------------------------------------------------------------------------------------------------&lt;BR /&gt;[P4: Low] OTG-CRYPST-001: Secure renegotiation not supported.&lt;BR /&gt;*As per my checks there ware actually 2 FRs for this feature in the past:&lt;BR /&gt;&lt;STRONG&gt;FR ID: 8112&lt;/STRONG&gt; (support for secure renegotiation / inbound SSL decrypt and GlobalProtect )&lt;BR /&gt;&lt;STRONG&gt;FR ID: 18516&lt;/STRONG&gt; (Support for RFC 5746 )&lt;BR /&gt;&lt;BR /&gt;*And to fix this it's required to remove weak ciphers from CLI, and use the newest PAN-OS (10.2.5) version that should now support renegotiation:&lt;BR /&gt;As per: &lt;A href="https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-release-notes/pan-os-10-2-5-known-and-addressed-issues/pan-os-10-2-5-addressed-issues" target="_self"&gt;&lt;SPAN&gt;PAN-OS 10.2.5 Addressed Issues&lt;/SPAN&gt;&lt;/A&gt;&lt;BR /&gt;&lt;SPAN&gt;&lt;STRONG&gt;PAN-184630&lt;/STRONG&gt; - Fixed an issue where TLS clients, such as those using OpenSSL 3.0, enforced the TLS renegotiation extension (RFC 5746).&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Or we can refer to the KB: &lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000CmqeCAC" target="_self"&gt;How to disable medium strength SSL ciphers for SSL/TLS Service Profile on Firewall&lt;/A&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;[P4: Low] OTG-CRYPST-001: Elliptic curves offered with insufficient level of security.&lt;BR /&gt;*And this article provides information on how to harden the SSH service running on the management interface by disabling weak ciphers and weak key (key exchange) algorithms&lt;BR /&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000PN5bCAG" target="_self"&gt;&lt;SPAN&gt;How to fix Weak Ciphers and Keys on the Management Interface for SSH Access&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;[P4: Low] OTG-CRYPST-001: Server potentially vulnerable to LUCKY13 attack.&lt;BR /&gt;[P4: Low] OTG-CRYPST-001: Insecure digital certificates - chain of trust.&lt;BR /&gt;&lt;EM&gt;missing info about remediation for last two vulnerabilities&amp;nbsp;&lt;/EM&gt;&lt;BR /&gt;------------------------------------------------------------------------------------------------------------------------&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;Configuration and Deploy Management Testing - OTG-CONFIG-001 Test Network/Infrastructure Configuration&lt;/STRONG&gt;&lt;BR /&gt;------------------------------------------------------------------------------------------------------------------------&lt;BR /&gt;[P4: Low] OTG-CONFIG-001: Missing X-Permitted-Cross-Domain-Policies security header.&lt;BR /&gt;[P4: Low] OTG-CONFIG-001: Insecure HTTP header - X-XSS-Protection.&lt;BR /&gt;[P4: Low] OTG-CONFIG-001: Missing Referrer-Policy security header.&lt;BR /&gt;[P4: Low] OTG-CONFIG-001: Unsafe Content-Security-Policy security header configuration.&lt;BR /&gt;&lt;EM&gt;missing info about remediation&amp;nbsp;&lt;/EM&gt;&lt;BR /&gt;------------------------------------------------------------------------------------------------------------------------&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;Session Management Testing - OTG-SESS-002 - Testing for Cookies attributes&lt;/STRONG&gt;&lt;BR /&gt;------------------------------------------------------------------------------------------------------------------------&lt;BR /&gt;[P5: Informational] OTG-SESS-002: Duplicate cookies set.&lt;BR /&gt;&lt;EM&gt;missing info about remediation&amp;nbsp;&lt;/EM&gt;&lt;BR /&gt;------------------------------------------------------------------------------------------------------------------------&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Could anyone please advise in regards to vulnerabilities I have no info about, and the possible remediation, or point to some documentation about the same. &lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I will appreciate your help and guidance in regards to the vulnerabilities I've listed above.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you in advance!&lt;/P&gt;
&lt;P&gt;Cheers!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 27 Oct 2023 14:45:49 GMT</pubDate>
    <dc:creator>A_Adamski</dc:creator>
    <dc:date>2023-10-27T14:45:49Z</dc:date>
    <item>
      <title>Info about the vulnerabilities and the possible remediations for them.</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/info-about-the-vulnerabilities-and-the-possible-remediations-for/m-p/563388#M2017</link>
      <description>&lt;P&gt;Dear All,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I hope you could help me with the query I could not find answer.&lt;/P&gt;
&lt;P&gt;The customer is asking for the remediation of the detected vulnerabilities, which I've already researched and found some info about that I've grouped below:&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;Client Side Testing - OTG-CLIENT-004 - Testing for Client Side URL Redirect &lt;/STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;------------------------------------------------------------------------------------------------------------------------&lt;BR /&gt;[P3: Medium] OTG-CLIENT-004: External redirect via host header injection.&lt;BR /&gt;*I found the below conversations form the Live community about it:&lt;BR /&gt;&lt;A href="https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-redirection-via-arbitrary-host-header/td-p/559138" target="_self"&gt;&lt;SPAN&gt;Global Protect - Redirection via Arbitrary Host Header Manipulation&lt;/SPAN&gt;&lt;/A&gt;&lt;BR /&gt;&lt;A href="https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-qualys-150307-external-service-interaction-via/td-p/432405" target="_self"&gt;&lt;SPAN&gt;GlobalProtect Qualys: 150307 External Service interaction via Host Header Injection&lt;/SPAN&gt;&lt;/A&gt;&lt;BR /&gt;------------------------------------------------------------------------------------------------------------------------&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;Cryptography - OTG-CRYPST-001 - Testing for Weak SSL/TSL Ciphers, Insufficient Transport Layer Protection&lt;/STRONG&gt;&lt;BR /&gt;------------------------------------------------------------------------------------------------------------------------&lt;BR /&gt;[P4: Low] OTG-CRYPST-001: Secure renegotiation not supported.&lt;BR /&gt;*As per my checks there ware actually 2 FRs for this feature in the past:&lt;BR /&gt;&lt;STRONG&gt;FR ID: 8112&lt;/STRONG&gt; (support for secure renegotiation / inbound SSL decrypt and GlobalProtect )&lt;BR /&gt;&lt;STRONG&gt;FR ID: 18516&lt;/STRONG&gt; (Support for RFC 5746 )&lt;BR /&gt;&lt;BR /&gt;*And to fix this it's required to remove weak ciphers from CLI, and use the newest PAN-OS (10.2.5) version that should now support renegotiation:&lt;BR /&gt;As per: &lt;A href="https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-release-notes/pan-os-10-2-5-known-and-addressed-issues/pan-os-10-2-5-addressed-issues" target="_self"&gt;&lt;SPAN&gt;PAN-OS 10.2.5 Addressed Issues&lt;/SPAN&gt;&lt;/A&gt;&lt;BR /&gt;&lt;SPAN&gt;&lt;STRONG&gt;PAN-184630&lt;/STRONG&gt; - Fixed an issue where TLS clients, such as those using OpenSSL 3.0, enforced the TLS renegotiation extension (RFC 5746).&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Or we can refer to the KB: &lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000CmqeCAC" target="_self"&gt;How to disable medium strength SSL ciphers for SSL/TLS Service Profile on Firewall&lt;/A&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;[P4: Low] OTG-CRYPST-001: Elliptic curves offered with insufficient level of security.&lt;BR /&gt;*And this article provides information on how to harden the SSH service running on the management interface by disabling weak ciphers and weak key (key exchange) algorithms&lt;BR /&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000PN5bCAG" target="_self"&gt;&lt;SPAN&gt;How to fix Weak Ciphers and Keys on the Management Interface for SSH Access&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;[P4: Low] OTG-CRYPST-001: Server potentially vulnerable to LUCKY13 attack.&lt;BR /&gt;[P4: Low] OTG-CRYPST-001: Insecure digital certificates - chain of trust.&lt;BR /&gt;&lt;EM&gt;missing info about remediation for last two vulnerabilities&amp;nbsp;&lt;/EM&gt;&lt;BR /&gt;------------------------------------------------------------------------------------------------------------------------&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;Configuration and Deploy Management Testing - OTG-CONFIG-001 Test Network/Infrastructure Configuration&lt;/STRONG&gt;&lt;BR /&gt;------------------------------------------------------------------------------------------------------------------------&lt;BR /&gt;[P4: Low] OTG-CONFIG-001: Missing X-Permitted-Cross-Domain-Policies security header.&lt;BR /&gt;[P4: Low] OTG-CONFIG-001: Insecure HTTP header - X-XSS-Protection.&lt;BR /&gt;[P4: Low] OTG-CONFIG-001: Missing Referrer-Policy security header.&lt;BR /&gt;[P4: Low] OTG-CONFIG-001: Unsafe Content-Security-Policy security header configuration.&lt;BR /&gt;&lt;EM&gt;missing info about remediation&amp;nbsp;&lt;/EM&gt;&lt;BR /&gt;------------------------------------------------------------------------------------------------------------------------&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;Session Management Testing - OTG-SESS-002 - Testing for Cookies attributes&lt;/STRONG&gt;&lt;BR /&gt;------------------------------------------------------------------------------------------------------------------------&lt;BR /&gt;[P5: Informational] OTG-SESS-002: Duplicate cookies set.&lt;BR /&gt;&lt;EM&gt;missing info about remediation&amp;nbsp;&lt;/EM&gt;&lt;BR /&gt;------------------------------------------------------------------------------------------------------------------------&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Could anyone please advise in regards to vulnerabilities I have no info about, and the possible remediation, or point to some documentation about the same. &lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I will appreciate your help and guidance in regards to the vulnerabilities I've listed above.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you in advance!&lt;/P&gt;
&lt;P&gt;Cheers!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 27 Oct 2023 14:45:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/info-about-the-vulnerabilities-and-the-possible-remediations-for/m-p/563388#M2017</guid>
      <dc:creator>A_Adamski</dc:creator>
      <dc:date>2023-10-27T14:45:49Z</dc:date>
    </item>
    <item>
      <title>Re: Info about the vulnerabilities and the possible remediations for them.</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/info-about-the-vulnerabilities-and-the-possible-remediations-for/m-p/565352#M2078</link>
      <description>&lt;P&gt;To keep you posted.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Following the PAN-OS firmware update to version 10.2.5 and the completion of a "PENTEST," vulnerabilities with P3 and P5 priority have been successfully resolved.&lt;/P&gt;
&lt;P&gt;Only vulnerabilities categorized as P4 remain. &lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="VERIFICA.PNG" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/55138i54044EE1C96A5651/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="VERIFICA.PNG" alt="VERIFICA.PNG" /&gt;&lt;/span&gt;Above is a screenshot outlining the remaining vulnerabilities.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As the newer PAN-OS version is now recommended we will try to upgrade the software to version 10.2.6 and see if this will help.&lt;BR /&gt;We want also to verify that the newest content updates are installed on the firewall.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;But could anyone maybe advise in regards to vulnerabilities, and the possible remediation, or point to some documentation about the same.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I will appreciate your help and guidance in regards to the vulnerabilities I've listed above.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you in advance!&lt;/P&gt;
&lt;P&gt;Cheers!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 13 Nov 2023 11:15:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/info-about-the-vulnerabilities-and-the-possible-remediations-for/m-p/565352#M2078</guid>
      <dc:creator>A_Adamski</dc:creator>
      <dc:date>2023-11-13T11:15:23Z</dc:date>
    </item>
  </channel>
</rss>

