<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: openSSH version 9.8 or later in PAN-OS in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/openssh-version-9-8-or-later-in-pan-os/m-p/1225602#M5765</link>
    <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/152128"&gt;@RVizcarra&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I recently had a VAPT (internal) like you, and ran across the same issue.&amp;nbsp; There appears to be quite a few vulnerabilities with the current version of OpenSSH in PAN-OS.&amp;nbsp; &lt;A href="https://www.cybersecurity-help.cz/vdb/openssh/openssh/8.0p1/" target="_blank"&gt;https://www.cybersecurity-help.cz/vdb/openssh/openssh/8.0p1/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I would like PANW to update the URL you provided to add PAN-OS 11.1 and 11.2.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This thread was also useful &lt;A href="https://live.paloaltonetworks.com/t5/next-generation-firewall/openssh-verification-and-upgrade/td-p/578427" target="_blank"&gt;https://live.paloaltonetworks.com/t5/next-generation-firewall/openssh-verification-and-upgrade/td-p/578427&lt;/A&gt; because it provides (1) and easy test and (2) the PANW PSIRT email to which you can ask them about the vulnerabilities.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tom&lt;/P&gt;</description>
    <pubDate>Thu, 03 Apr 2025 15:56:51 GMT</pubDate>
    <dc:creator>TomYoung</dc:creator>
    <dc:date>2025-04-03T15:56:51Z</dc:date>
    <item>
      <title>openSSH version 9.8 or later in PAN-OS</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/openssh-version-9-8-or-later-in-pan-os/m-p/1225536#M5763</link>
      <description>&lt;P&gt;Hi Guys,&lt;BR /&gt;&lt;BR /&gt;Hope you are all doing well.&lt;BR /&gt;&lt;BR /&gt;Just wanted to confirm which PAN-OS currently has an openSSH 9.8 version or later?&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Following this kb article:&amp;nbsp;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClgBCAS" target="_blank"&gt;How to check the OpenSSH version the PAN-OS device is using - Knowledge Base - Palo Alto Networks&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;I did try to check it on Palo Alto networks OSS Licenses, however seems like the most updated PAN-OS that is listed there is only 11.0 and the openSSH version for that is only 8.0&lt;BR /&gt;&lt;A href="https://docs.paloaltonetworks.com/oss-listings/pan-os-oss-listings/pan-os-11-0-open-source-software-oss-listing" target="_blank"&gt;PAN-OS 11.0 OSS Listing&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;my current version is on 10.2.x and planning to upgrade it as recommended on the VAPT assessment to upgrade the openSSH into 9.8version or later.&lt;BR /&gt;&lt;BR /&gt;PA model: PA-820&lt;BR /&gt;&lt;BR /&gt;Thanks&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 03 Apr 2025 05:26:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/openssh-version-9-8-or-later-in-pan-os/m-p/1225536#M5763</guid>
      <dc:creator>RVizcarra</dc:creator>
      <dc:date>2025-04-03T05:26:15Z</dc:date>
    </item>
    <item>
      <title>Re: openSSH version 9.8 or later in PAN-OS</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/openssh-version-9-8-or-later-in-pan-os/m-p/1225602#M5765</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/152128"&gt;@RVizcarra&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I recently had a VAPT (internal) like you, and ran across the same issue.&amp;nbsp; There appears to be quite a few vulnerabilities with the current version of OpenSSH in PAN-OS.&amp;nbsp; &lt;A href="https://www.cybersecurity-help.cz/vdb/openssh/openssh/8.0p1/" target="_blank"&gt;https://www.cybersecurity-help.cz/vdb/openssh/openssh/8.0p1/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I would like PANW to update the URL you provided to add PAN-OS 11.1 and 11.2.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This thread was also useful &lt;A href="https://live.paloaltonetworks.com/t5/next-generation-firewall/openssh-verification-and-upgrade/td-p/578427" target="_blank"&gt;https://live.paloaltonetworks.com/t5/next-generation-firewall/openssh-verification-and-upgrade/td-p/578427&lt;/A&gt; because it provides (1) and easy test and (2) the PANW PSIRT email to which you can ask them about the vulnerabilities.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tom&lt;/P&gt;</description>
      <pubDate>Thu, 03 Apr 2025 15:56:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/openssh-version-9-8-or-later-in-pan-os/m-p/1225602#M5765</guid>
      <dc:creator>TomYoung</dc:creator>
      <dc:date>2025-04-03T15:56:51Z</dc:date>
    </item>
    <item>
      <title>Re: openSSH version 9.8 or later in PAN-OS</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/openssh-version-9-8-or-later-in-pan-os/m-p/1225878#M5774</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/152128"&gt;@RVizcarra&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I sent an email to &lt;A href="mailto:psirt@paloaltonetworks.com" target="_blank"&gt;psirt@paloaltonetworks.com&lt;/A&gt; and I got the following response:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;SPAN&gt;PAN-OS runs a custom build of OpenSSH, so the version number does not necessarily correspond with applicable OpenSSH CVEs. This OpenSSH build receives regular security updates.&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN&gt;You may find some information about the reported CVEs in our informational advisories. You can try the query feature of the security advisories site: &lt;/SPAN&gt;&lt;A style="color: #0078d7; font-family: Aptos; font-size: 16px; font-style: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px;" title="https://security.paloaltonetworks.com/?q=" href="https://security.paloaltonetworks.com/?q=" target="_blank" rel="noopener" data-outlook-id="96adbca5-83e6-4baa-a52d-82e6ca1ca520"&gt;https://security.paloaltonetworks.com/?q=&lt;/A&gt;&lt;SPAN&gt;&amp;lt;CVE&amp;gt; (replace &amp;lt;CVE&amp;gt; with the id of the CVE you are looking for, for eg: &lt;/SPAN&gt;&lt;A style="color: #0078d7; font-family: Aptos; font-size: 16px; font-style: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px;" title="https://security.paloaltonetworks.com/?q=CVE-2024-1234" href="https://security.paloaltonetworks.com/?q=CVE-2024-1234" target="_blank" rel="noopener" data-outlook-id="4decc899-cf4c-4da6-9344-a0d5377f89bb"&gt;https://security.paloaltonetworks.com/?q=CVE-2024-1234&lt;/A&gt;&lt;SPAN&gt;).&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN&gt;If there are any CVEs you are concerned about that is not mentioned in the advisories, please let us know - so that we can investigate further.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;That was very helpful!&amp;nbsp; So, I took the list of OpenSSH 8.0p1 CVEs (in my 1st thread) and search for each one in the tool provided above.&amp;nbsp; Here are the results:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;TABLE border="1" width="99.90850869167431%"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD width="16.65141811527905%"&gt;&lt;STRONG&gt;OpenSSH 8.0p1 Advisory&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD width="16.65141811527905%"&gt;&lt;STRONG&gt;Severity&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD width="16.65141811527905%"&gt;&lt;STRONG&gt;CVEs&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD width="16.65141811527905%"&gt;&lt;STRONG&gt;CWEs&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD width="16.65141811527905%"&gt;&lt;STRONG&gt;PANW Advisory&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD width="16.65141811527905%"&gt;&lt;STRONG&gt;Impact&lt;/STRONG&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="16.65141811527905%"&gt;Multiple vulnerabilities in OpenSSH&lt;/TD&gt;
&lt;TD width="16.65141811527905%"&gt;Medium&lt;/TD&gt;
&lt;TD width="16.65141811527905%"&gt;CVE-2023-6004&lt;/TD&gt;
&lt;TD width="16.65141811527905%"&gt;CWE-78&lt;/TD&gt;
&lt;TD width="16.65141811527905%"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD width="16.65141811527905%"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="16.65141811527905%"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD width="16.65141811527905%"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD width="16.65141811527905%"&gt;CVE-2023-48795&lt;/TD&gt;
&lt;TD width="16.65141811527905%"&gt;CWE-326&lt;/TD&gt;
&lt;TD width="16.65141811527905%"&gt;&lt;A href="https://security.paloaltonetworks.com/CVE-2023-48795" target="_blank"&gt;https://security.paloaltonetworks.com/CVE-2023-48795&lt;/A&gt;&lt;/TD&gt;
&lt;TD width="16.65141811527905%"&gt;Fixed in multiple versions&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="16.65141811527905%"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD width="16.65141811527905%"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD width="16.65141811527905%"&gt;CVE-2023-51384, CVE-2023-51385&lt;/TD&gt;
&lt;TD width="16.65141811527905%"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD width="16.65141811527905%"&gt;&lt;A href="https://security.paloaltonetworks.com/PAN-SA-2024-0001" target="_blank"&gt;https://security.paloaltonetworks.com/PAN-SA-2024-0001&lt;/A&gt;&lt;/TD&gt;
&lt;TD width="16.65141811527905%"&gt;Not affected&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="16.65141811527905%"&gt;Remote code execution in OpenSSH ssh-agent&lt;/TD&gt;
&lt;TD width="16.65141811527905%"&gt;Medium&lt;/TD&gt;
&lt;TD width="16.65141811527905%"&gt;CVE-2023-38408&lt;/TD&gt;
&lt;TD width="16.65141811527905%"&gt;CWE-426&lt;/TD&gt;
&lt;TD width="16.65141811527905%"&gt;&lt;A href="https://security.paloaltonetworks.com/PAN-SA-2024-0001" target="_blank"&gt;https://security.paloaltonetworks.com/PAN-SA-2024-0001&lt;/A&gt;&lt;/TD&gt;
&lt;TD width="16.65141811527905%"&gt;Not affected&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="16.65141811527905%"&gt;Multiple vulnerabilities in OpenSSH&lt;/TD&gt;
&lt;TD width="16.65141811527905%"&gt;Low&lt;/TD&gt;
&lt;TD width="16.65141811527905%"&gt;N/A&lt;/TD&gt;
&lt;TD width="16.65141811527905%"&gt;CWE-119, CWE-415&lt;/TD&gt;
&lt;TD width="16.65141811527905%"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD width="16.65141811527905%"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="16.65141811527905%"&gt;Amazon Linux AMI update for openssh, Privilege escalation in OpenSSH&lt;/TD&gt;
&lt;TD width="16.65141811527905%"&gt;Low&lt;/TD&gt;
&lt;TD width="16.65141811527905%"&gt;CVE-2021-41617&lt;/TD&gt;
&lt;TD width="16.65141811527905%"&gt;CWE-269&lt;/TD&gt;
&lt;TD width="16.65141811527905%"&gt;&lt;A href="https://security.paloaltonetworks.com/CVE-2021-41617" target="_blank"&gt;https://security.paloaltonetworks.com/CVE-2021-41617&lt;/A&gt;&lt;/TD&gt;
&lt;TD width="16.65141811527905%"&gt;Not affected&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="16.65141811527905%"&gt;MitM attack in OpenSSH client&lt;/TD&gt;
&lt;TD width="16.65141811527905%"&gt;Medium&lt;/TD&gt;
&lt;TD width="16.65141811527905%"&gt;CVE-2020-14145&lt;/TD&gt;
&lt;TD width="16.65141811527905%"&gt;CWE-327&lt;/TD&gt;
&lt;TD width="16.65141811527905%"&gt;&lt;A href="https://security.paloaltonetworks.com/PAN-SA-2024-0004" target="_blank"&gt;https://security.paloaltonetworks.com/PAN-SA-2024-0004&lt;/A&gt;&lt;/TD&gt;
&lt;TD width="16.65141811527905%"&gt;Fixed in 10.2.3 and above&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="16.65141811527905%"&gt;Security restrictions bypass in OpenSSH&lt;/TD&gt;
&lt;TD width="16.65141811527905%"&gt;Low&lt;/TD&gt;
&lt;TD width="16.65141811527905%"&gt;N/A&lt;/TD&gt;
&lt;TD width="16.65141811527905%"&gt;CWE-399&lt;/TD&gt;
&lt;TD width="16.65141811527905%"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD width="16.65141811527905%"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="16.65141811527905%"&gt;Privilege escalation in OpenSSH&lt;/TD&gt;
&lt;TD width="16.65141811527905%"&gt;Low&lt;/TD&gt;
&lt;TD width="16.65141811527905%"&gt;CVE-2019-16905&lt;/TD&gt;
&lt;TD width="16.65141811527905%"&gt;CWE-190&lt;/TD&gt;
&lt;TD width="16.65141811527905%"&gt;&lt;A href="https://security.paloaltonetworks.com/PAN-SA-2024-0001" target="_blank"&gt;https://security.paloaltonetworks.com/PAN-SA-2024-0001&lt;/A&gt;&lt;/TD&gt;
&lt;TD width="16.65141811527905%"&gt;Not affected&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So, everything is fixed in the current OpenSSH version of PAN-OS, except we have no information about 1 CVE and 3 CWEs.&amp;nbsp; If you must have confirmation about the undocumented vulnerabilities, you can email the PANW PSIRT team about those specifically.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tom&lt;/P&gt;</description>
      <pubDate>Tue, 08 Apr 2025 01:49:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/openssh-version-9-8-or-later-in-pan-os/m-p/1225878#M5774</guid>
      <dc:creator>TomYoung</dc:creator>
      <dc:date>2025-04-08T01:49:30Z</dc:date>
    </item>
  </channel>
</rss>

