<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: OpenSSH verification and upgrade in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/openssh-verification-and-upgrade/m-p/578433#M2718</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/220861"&gt;@Ryan_Volante&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;to check the OpenSSH version, you can telnet to it on port 22, for instance:&lt;/P&gt;
&lt;P&gt;telnet 192.168.0.253 22&lt;/P&gt;
&lt;P&gt;&amp;nbsp;SSH-2.0-OpenSSH_8.0&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;On the other hand, regarding any concern on vulnerabilities on open source software used in PAN-OS, I would advise you to send an email to our PSIRT team&amp;nbsp;&lt;STRONG&gt;&lt;A href="mailto:psirt@paloaltonetworks.com" target="_blank"&gt;psirt@paloaltonetworks.com,&lt;/A&gt;&amp;nbsp;y&lt;/STRONG&gt;ou should&amp;nbsp; receive a reply back within 2 business days.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;--Richard&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 27 Feb 2024 08:31:18 GMT</pubDate>
    <dc:creator>rdumoulin</dc:creator>
    <dc:date>2024-02-27T08:31:18Z</dc:date>
    <item>
      <title>OpenSSH verification and upgrade</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/openssh-verification-and-upgrade/m-p/578427#M2716</link>
      <description>&lt;P&gt;Aside from checking in the OSS listing, how can i verify the current OpenSSH version installed on the Palo Alto device. Also how can we upgrade it to a recommended version?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Current firmware version: 10.2.6&lt;/P&gt;
&lt;P&gt;Based on OSS listing, OpenSSH version is: 8.0p1&lt;/P&gt;</description>
      <pubDate>Tue, 27 Feb 2024 07:29:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/openssh-verification-and-upgrade/m-p/578427#M2716</guid>
      <dc:creator>Ryan_Volante</dc:creator>
      <dc:date>2024-02-27T07:29:57Z</dc:date>
    </item>
    <item>
      <title>Re: OpenSSH verification and upgrade</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/openssh-verification-and-upgrade/m-p/578428#M2717</link>
      <description>&lt;P&gt;To give additional context:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The client ran a VAPT scan using Qualys, and based on the report it is affected by multiple Open SSH vulnerabilities. One of the recommendation is to Upgrade it to a OpenSSH version 9.6.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 27 Feb 2024 07:35:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/openssh-verification-and-upgrade/m-p/578428#M2717</guid>
      <dc:creator>Ryan_Volante</dc:creator>
      <dc:date>2024-02-27T07:35:03Z</dc:date>
    </item>
    <item>
      <title>Re: OpenSSH verification and upgrade</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/openssh-verification-and-upgrade/m-p/578433#M2718</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/220861"&gt;@Ryan_Volante&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;to check the OpenSSH version, you can telnet to it on port 22, for instance:&lt;/P&gt;
&lt;P&gt;telnet 192.168.0.253 22&lt;/P&gt;
&lt;P&gt;&amp;nbsp;SSH-2.0-OpenSSH_8.0&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;On the other hand, regarding any concern on vulnerabilities on open source software used in PAN-OS, I would advise you to send an email to our PSIRT team&amp;nbsp;&lt;STRONG&gt;&lt;A href="mailto:psirt@paloaltonetworks.com" target="_blank"&gt;psirt@paloaltonetworks.com,&lt;/A&gt;&amp;nbsp;y&lt;/STRONG&gt;ou should&amp;nbsp; receive a reply back within 2 business days.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;--Richard&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 27 Feb 2024 08:31:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/openssh-verification-and-upgrade/m-p/578433#M2718</guid>
      <dc:creator>rdumoulin</dc:creator>
      <dc:date>2024-02-27T08:31:18Z</dc:date>
    </item>
  </channel>
</rss>

