<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Clarification Needed: PAN-OS 11.2.x Vulnerability Status and Mitigation in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/clarification-needed-pan-os-11-2-x-vulnerability-status-and/m-p/1241901#M6445</link>
    <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;1) Version Clarification&amp;nbsp;&lt;BR /&gt;&lt;/STRONG&gt;&lt;EM&gt;Is PAN-OS 11.2.x (specifically 11.2.4-h1) affected by CVE-2023-48795 (Terrapin SSH Attack)? The advisory lists up to 11.1.x but does not mention 11.2.x.&amp;nbsp;&lt;BR /&gt;&lt;/EM&gt;&lt;STRONG&gt;2) Mitigation Confirmation&amp;nbsp;&lt;BR /&gt;&lt;/STRONG&gt;&lt;EM&gt;If 11.2.x is affected, does disabling chacha20-poly1305&lt;CODE&gt;&lt;/CODE&gt;and Encrypt-then-MAC algorithms fully mitigate the risk, or is an upgrade required?&amp;nbsp;&lt;BR /&gt;&lt;/EM&gt;&lt;STRONG&gt;3) Hotfix Details&amp;nbsp;&lt;BR /&gt;&lt;/STRONG&gt;&lt;EM&gt;Does the hotfix version 11.2.4-h1 include the patch for CVE-2023-48795, or do we need to move to 11.2.4-h4 or later?&lt;STRONG&gt;4)&lt;/STRONG&gt;&amp;nbsp;&lt;/EM&gt;&lt;STRONG&gt;Future Advisory Updates&amp;nbsp;&lt;BR /&gt;&lt;/STRONG&gt;&lt;EM&gt;Will Palo Alto update the official advisory to include PAN-OS 11.2.x status for CVE-2023-48795?&amp;nbsp;&lt;BR /&gt;&lt;/EM&gt;&lt;STRONG&gt;5) Best Practice&amp;nbsp;&lt;BR /&gt;&lt;/STRONG&gt;&lt;EM&gt;What is the recommended approach for customers running PAN-OS 11.2.x regarding Terrapin SSH vulnerability—upgrade path or configuration hardening?&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 14 Nov 2025 13:15:39 GMT</pubDate>
    <dc:creator>N.Parre</dc:creator>
    <dc:date>2025-11-14T13:15:39Z</dc:date>
    <item>
      <title>Clarification Needed: PAN-OS 11.2.x Vulnerability Status and Mitigation</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/clarification-needed-pan-os-11-2-x-vulnerability-status-and/m-p/1241901#M6445</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;1) Version Clarification&amp;nbsp;&lt;BR /&gt;&lt;/STRONG&gt;&lt;EM&gt;Is PAN-OS 11.2.x (specifically 11.2.4-h1) affected by CVE-2023-48795 (Terrapin SSH Attack)? The advisory lists up to 11.1.x but does not mention 11.2.x.&amp;nbsp;&lt;BR /&gt;&lt;/EM&gt;&lt;STRONG&gt;2) Mitigation Confirmation&amp;nbsp;&lt;BR /&gt;&lt;/STRONG&gt;&lt;EM&gt;If 11.2.x is affected, does disabling chacha20-poly1305&lt;CODE&gt;&lt;/CODE&gt;and Encrypt-then-MAC algorithms fully mitigate the risk, or is an upgrade required?&amp;nbsp;&lt;BR /&gt;&lt;/EM&gt;&lt;STRONG&gt;3) Hotfix Details&amp;nbsp;&lt;BR /&gt;&lt;/STRONG&gt;&lt;EM&gt;Does the hotfix version 11.2.4-h1 include the patch for CVE-2023-48795, or do we need to move to 11.2.4-h4 or later?&lt;STRONG&gt;4)&lt;/STRONG&gt;&amp;nbsp;&lt;/EM&gt;&lt;STRONG&gt;Future Advisory Updates&amp;nbsp;&lt;BR /&gt;&lt;/STRONG&gt;&lt;EM&gt;Will Palo Alto update the official advisory to include PAN-OS 11.2.x status for CVE-2023-48795?&amp;nbsp;&lt;BR /&gt;&lt;/EM&gt;&lt;STRONG&gt;5) Best Practice&amp;nbsp;&lt;BR /&gt;&lt;/STRONG&gt;&lt;EM&gt;What is the recommended approach for customers running PAN-OS 11.2.x regarding Terrapin SSH vulnerability—upgrade path or configuration hardening?&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 14 Nov 2025 13:15:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/clarification-needed-pan-os-11-2-x-vulnerability-status-and/m-p/1241901#M6445</guid>
      <dc:creator>N.Parre</dc:creator>
      <dc:date>2025-11-14T13:15:39Z</dc:date>
    </item>
    <item>
      <title>Re: Clarification Needed: PAN-OS 11.2.x Vulnerability Status and Mitigation</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/clarification-needed-pan-os-11-2-x-vulnerability-status-and/m-p/1241902#M6446</link>
      <description>&lt;P&gt;according to&amp;nbsp;&lt;A href="https://security.paloaltonetworks.com/CVE-2023-48795" target="_blank"&gt;https://security.paloaltonetworks.com/CVE-2023-48795&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;1) 11.2 is not affected&lt;/P&gt;
&lt;P&gt;2) 11.2 is not affected so no mitigation required&lt;/P&gt;
&lt;P&gt;3) it looks like this issue was either fully addressed by the time 11.2.0 came into GA hence the whole train is not affected, or a library causing this vulnerability in previous versions is not present in 11.2&lt;/P&gt;
&lt;P&gt;4) according to the article, 11.2.0 is already unaffected, so later versions will also be unaffected. relapse to vulnerability in 11.2 would have been documented as such&lt;/P&gt;
&lt;P&gt;5) if you believe the above information is incorrect, please open a support case for an authoritative answer from a source inside palo alto&lt;/P&gt;</description>
      <pubDate>Fri, 14 Nov 2025 13:42:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/clarification-needed-pan-os-11-2-x-vulnerability-status-and/m-p/1241902#M6446</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2025-11-14T13:42:38Z</dc:date>
    </item>
  </channel>
</rss>

