<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Software Version	11.1.5-h1 in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/software-version-11-1-5-h1/m-p/643905#M5046</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We are experiencing packet loss, and the IPsec tunnels are going down on the following version and model:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Software Version&lt;/STRONG&gt;: 11.1.5-h1&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Model&lt;/STRONG&gt;: PA-1420&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;After restarting the firewall, it resumes normal operation.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I want to know, this version is stable, any advise.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 21 Nov 2024 12:39:13 GMT</pubDate>
    <dc:creator>Suhail-Hameed</dc:creator>
    <dc:date>2024-11-21T12:39:13Z</dc:date>
    <item>
      <title>Software Version	11.1.5-h1</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/software-version-11-1-5-h1/m-p/643905#M5046</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We are experiencing packet loss, and the IPsec tunnels are going down on the following version and model:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Software Version&lt;/STRONG&gt;: 11.1.5-h1&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Model&lt;/STRONG&gt;: PA-1420&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;After restarting the firewall, it resumes normal operation.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I want to know, this version is stable, any advise.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 21 Nov 2024 12:39:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/software-version-11-1-5-h1/m-p/643905#M5046</guid>
      <dc:creator>Suhail-Hameed</dc:creator>
      <dc:date>2024-11-21T12:39:13Z</dc:date>
    </item>
    <item>
      <title>Re: Software Version	11.1.5-h1</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/software-version-11-1-5-h1/m-p/644066#M5047</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/116538"&gt;@Suhail-Hameed&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;11.1.5-h1 is a new version. It's too soon to be considered a preferred version.&lt;/P&gt;
&lt;P&gt;Currently 11.1.4-h7 is the preferred version in the 11.1.x PAN-OS.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please bookmark this page to know which OS versions are preferred:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;A href="https://live.paloaltonetworks.com/t5/customer-resources/support-pan-os-software-release-guidance/ta-p/258304" target="_blank" rel="noopener"&gt;Support PAN-OS Software Release Guidance&lt;/A&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kind regards,&lt;/P&gt;
&lt;P&gt;-Kim.&lt;/P&gt;</description>
      <pubDate>Thu, 21 Nov 2024 14:16:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/software-version-11-1-5-h1/m-p/644066#M5047</guid>
      <dc:creator>kiwi</dc:creator>
      <dc:date>2024-11-21T14:16:55Z</dc:date>
    </item>
    <item>
      <title>Re: Software Version	11.1.5-h1</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/software-version-11-1-5-h1/m-p/644862#M5049</link>
      <description>&lt;P&gt;Kiwi,&lt;BR /&gt;&lt;BR /&gt;I can understand why they went to 11.1.5-h1, because in the Palo CVE-2024-0012 and CVE-2024-9474 it clearly states affected ; less than 11.1.5-h1.&amp;nbsp; Unaffected: greater than or equal to 11.1.5-h1.&lt;BR /&gt;&lt;BR /&gt;We were on 11.1.2 and moved to 11.1.4-h7.&amp;nbsp; Its a preferred release and the notes state that these CVE fixes are in there, and preferred as of 11/18/2024.&amp;nbsp; &lt;BR /&gt;&lt;BR /&gt;I would just like clarification as to if we are really protected, because these links lead you to believe in the 11.1 train you need 11.1.5-h1 or newer.&amp;nbsp; Please advise.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://security.paloaltonetworks.com/CVE-2024-0012" target="_blank"&gt;https://security.paloaltonetworks.com/CVE-2024-0012&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://security.paloaltonetworks.com/CVE-2024-9474" target="_blank"&gt;https://security.paloaltonetworks.com/CVE-2024-9474&lt;/A&gt;&lt;/P&gt;
&lt;DIV id="tinyMceEditor_22fd5d308204c1ksauer507_0" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;Now look at the releases post:&lt;BR /&gt;&lt;A href="https://live.paloaltonetworks.com/t5/customer-resources/support-pan-os-software-release-guidance/ta-p/258304" target="_blank"&gt;https://live.paloaltonetworks.com/t5/customer-resources/support-pan-os-software-release-guidance/ta-p/258304&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;TABLE style="height: 1043px; width: 900px;" role="grid" width="899px"&gt;
&lt;THEAD&gt;
&lt;TR&gt;
&lt;TD width="87.9844px" height="451px" class="lia-align-center"&gt;
&lt;DIV&gt;&lt;STRONG&gt;P&lt;/STRONG&gt;*&lt;/DIV&gt;
&lt;/TD&gt;
&lt;TD width="87.9688px" height="451px"&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/11-1/pan-os-release-notes/pan-os-11-1-4-known-and-addressed-issues/pan-os-11-1-4-h7-addressed-issues" target="_blank" rel="noopener nofollow noreferrer"&gt;11.1.4-h7&lt;/A&gt;&lt;/TD&gt;
&lt;TD width="97.9844px" height="451px"&gt;11/18/24&lt;/TD&gt;
&lt;TD width="625.062px" height="451px"&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;Preferred Release&lt;/STRONG&gt; [11/18/24]&lt;/SPAN&gt;&lt;BR /&gt;&lt;STRONG&gt;Note&lt;/STRONG&gt;: A fix was made to address&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://security.paloaltonetworks.com/CVE-2024-0012" target="_blank" rel="noopener noreferrer nofollow"&gt;CVE-2024-0012&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;(&lt;A href="https://security.paloaltonetworks.com/PAN-SA-2024-0015" target="_blank" rel="noopener noreferrer nofollow"&gt;PAN-SA-2024-0015&lt;/A&gt;) and&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://security.paloaltonetworks.com/CVE-2024-9474" target="_blank" rel="noopener noreferrer nofollow"&gt;CVE-2024-9474&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;Note:&amp;nbsp;&lt;/STRONG&gt;If using IoT Security&lt;/SPAN&gt;&lt;SPAN&gt;, wifclient might exit multiple times causing firewall to reboot.&amp;nbsp;&lt;BR /&gt;Workaround:&lt;BR /&gt;Uninstall IoT License and disable Enhanced Application Logs&lt;BR /&gt;&lt;STRONG&gt;Note:&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;lt;meta charset="utf-8" /&amp;gt;&lt;/P&gt;
&lt;P&gt;If using IoT Security&lt;SPAN&gt;, the device may run into wifclient crashes during server cert verification causing dataplane to restart&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;Workaround:&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;Use below CLI to disable CRL&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;PRE&gt;&lt;SPAN&gt;debug iot eal key-value PAN_ICD_SERVER_CERT_USE_CRL=False&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;Note: &lt;/STRONG&gt;[&lt;/SPAN&gt;&lt;SPAN&gt;PA-5400f Platforms Only ] Extremely h&lt;/SPAN&gt;&lt;SPAN&gt;igh receive packet rate can cause an interrupt storm leading to heartbeat failures and dataplane down.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So which one is it?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 21 Nov 2024 20:32:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/software-version-11-1-5-h1/m-p/644862#M5049</guid>
      <dc:creator>ksauer507</dc:creator>
      <dc:date>2024-11-21T20:32:56Z</dc:date>
    </item>
    <item>
      <title>Re: Software Version	11.1.5-h1</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/software-version-11-1-5-h1/m-p/644987#M5051</link>
      <description>&lt;P&gt;I opened a case with Palo to confirm the discrepancy between the CVE publications and the release notes posting.&amp;nbsp; They did confirm and I have it in writing that yes, both CVE's are also fixed in 11.1.4-h7.&amp;nbsp; Although the CVE notification claims you need 11.1.5-h1 or newer, that is not the case.&amp;nbsp; If the OP upgraded to 11.1.5-h1 because of the CVE, I feel bad he was mislead into a release that was not ready.&amp;nbsp; Hopefully PAN will update the CVE documentation.&lt;/P&gt;</description>
      <pubDate>Thu, 21 Nov 2024 21:48:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/software-version-11-1-5-h1/m-p/644987#M5051</guid>
      <dc:creator>ksauer507</dc:creator>
      <dc:date>2024-11-21T21:48:15Z</dc:date>
    </item>
    <item>
      <title>Re: Software Version	11.1.5-h1</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/software-version-11-1-5-h1/m-p/995785#M5114</link>
      <description>&lt;P&gt;I have a scheduled maintenance to upgrade to 11.1.5-h1 for Dec 6th.&amp;nbsp; I too was lead to believe that the above statement, you needed to go to 11.1.5-h1 to be covered for those CVEs, encompassed as PA-SA-2024-0015.&amp;nbsp; I am going to get in touch with my (new term) Solutions Consultant on Monday, as this is what I was searching for.&amp;nbsp; I'm going to send a link to this discussion thread to him, to get behind the scenes on to correctly get this answer.&amp;nbsp; I would prefer to be on the preferred version, so I hopefully do NOT encounter that stuck logon to OneDrive.&amp;nbsp; This would be 2 upgrades within the last 3 months and since CISA has added these to their KEV, I'm bound to do the upgrade on Friday the 6th (crossing my fingers).&lt;/P&gt;</description>
      <pubDate>Fri, 29 Nov 2024 23:57:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/software-version-11-1-5-h1/m-p/995785#M5114</guid>
      <dc:creator>JohnstonM</dc:creator>
      <dc:date>2024-11-29T23:57:31Z</dc:date>
    </item>
  </channel>
</rss>

