<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SSL and TLS vulnerabilities in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/ssl-and-tls-vulnerabilities/m-p/576629#M2606</link>
    <description>&lt;P&gt;Hi,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;These are the Vuln that are being flagged&amp;nbsp; ==-&amp;gt;&amp;nbsp; 1.&amp;nbsp;&lt;SPAN&gt;38913 SSH Prefix Truncation Vulnerability (Terrapin)&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;2. 38909 SHA1 deprecated setting for SSH&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 08 Feb 2024 15:39:49 GMT</pubDate>
    <dc:creator>Senibo</dc:creator>
    <dc:date>2024-02-08T15:39:49Z</dc:date>
    <item>
      <title>SSL and TLS vulnerabilities</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/ssl-and-tls-vulnerabilities/m-p/574943#M2541</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Hi Team,&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;We have to 2 Paloalto VM firewall running active-passive mode in AWS.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;As a part of internal Pentest we go the below findings for the Active and passive firewall nodes. The result refers to SSL and TLS vulnerabilities.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Could you please suggest on how to mitigate this.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 30 Jan 2024 15:34:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/ssl-and-tls-vulnerabilities/m-p/574943#M2541</guid>
      <dc:creator>Senibo</dc:creator>
      <dc:date>2024-01-30T15:34:43Z</dc:date>
    </item>
    <item>
      <title>Re: SSL and TLS vulnerabilities</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/ssl-and-tls-vulnerabilities/m-p/575165#M2546</link>
      <description>&lt;P&gt;What is the specific vulnerability that is being flagged? My first thought is that you dont have a SSL/TLS Service profile attached to the managment interface or enforcing a minimum of tls 1.2.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Add a certificate to a SSL/TLS Service profile and enforcing tls v1.2:&amp;nbsp;&lt;A href="https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/certificate-management/configure-an-ssltls-service-profile" target="_blank"&gt;Configure an SSL/TLS Service Profile (paloaltonetworks.com)&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Adding that SSL/TLS service profile to the management interface:&amp;nbsp;&lt;A href="https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-web-interface-help/device/device-setup-management" target="_blank"&gt;Device &amp;gt; Setup &amp;gt; Management (paloaltonetworks.com)&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 31 Jan 2024 20:32:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/ssl-and-tls-vulnerabilities/m-p/575165#M2546</guid>
      <dc:creator>Claw4609</dc:creator>
      <dc:date>2024-01-31T20:32:11Z</dc:date>
    </item>
    <item>
      <title>Re: SSL and TLS vulnerabilities</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/ssl-and-tls-vulnerabilities/m-p/576629#M2606</link>
      <description>&lt;P&gt;Hi,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;These are the Vuln that are being flagged&amp;nbsp; ==-&amp;gt;&amp;nbsp; 1.&amp;nbsp;&lt;SPAN&gt;38913 SSH Prefix Truncation Vulnerability (Terrapin)&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;2. 38909 SHA1 deprecated setting for SSH&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 08 Feb 2024 15:39:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/ssl-and-tls-vulnerabilities/m-p/576629#M2606</guid>
      <dc:creator>Senibo</dc:creator>
      <dc:date>2024-02-08T15:39:49Z</dc:date>
    </item>
    <item>
      <title>Re: SSL and TLS vulnerabilities</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/ssl-and-tls-vulnerabilities/m-p/576631#M2607</link>
      <description>&lt;P&gt;Gotcha, then in that case I believe you are needed to create an SSH service profile and attach it. Depending on what you're all needing to be removed you may also need to follow the KB article attached.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-admin/certificate-management/configure-an-ssh-service-profile" target="_blank"&gt;Configure an SSH Service Profile (paloaltonetworks.com)&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000PN5bCAG" target="_blank"&gt;How to fix Weak Ciphers and Keys on the Management Interface fo... - Knowledge Base - Palo Alto Networks&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 08 Feb 2024 15:50:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/ssl-and-tls-vulnerabilities/m-p/576631#M2607</guid>
      <dc:creator>Claw4609</dc:creator>
      <dc:date>2024-02-08T15:50:19Z</dc:date>
    </item>
  </channel>
</rss>

