<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Mitigation recommendation for certain vulnerability assesment done by VAPT team in Advanced Threat Prevention Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/mitigation-recommendation-for-certain-vulnerability-assesment/m-p/409629#M1162</link>
    <description>&lt;P&gt;Hi Team,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Current PAN OS -8.1.10&lt;/P&gt;&lt;P&gt;Customer had run a VAPT assesment where they came up with certain Vulnerability such as&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;90317 - SSH Weak Algorithms Supported &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;70658 - SSH Server CBC Mode Ciphers Enabled &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;71049 - SSH Weak MAC Algorithms Enabled &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;While checking certain things are not there from the firewall end but while checking using their Vulnerability Assessment tool they are having these mentioned output as above mentioned vulnerability.&lt;/P&gt;&lt;P&gt;Below is the firewall Output&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Firewall output:&lt;/P&gt;&lt;P&gt;# show deviceconfig system ssh ciphers mgmt&lt;BR /&gt;aes128-ctr;&lt;BR /&gt;aes128-gcm;&lt;BR /&gt;aes192-ctr;&lt;BR /&gt;aes256-ctr;&lt;BR /&gt;aes256-gcm;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;# show deviceconfig system ssh mac mgmt&lt;BR /&gt;&amp;#27; {&lt;BR /&gt;hmac-sha2-256;&lt;BR /&gt;hmac-sha2-512;&lt;/P&gt;&lt;P&gt;}&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Are the above mentioned Vulnerability is addressed in any other PAN OS version?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 27 May 2021 16:04:47 GMT</pubDate>
    <dc:creator>Vijaygvasan</dc:creator>
    <dc:date>2021-05-27T16:04:47Z</dc:date>
    <item>
      <title>Mitigation recommendation for certain vulnerability assesment done by VAPT team</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/mitigation-recommendation-for-certain-vulnerability-assesment/m-p/409629#M1162</link>
      <description>&lt;P&gt;Hi Team,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Current PAN OS -8.1.10&lt;/P&gt;&lt;P&gt;Customer had run a VAPT assesment where they came up with certain Vulnerability such as&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;90317 - SSH Weak Algorithms Supported &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;70658 - SSH Server CBC Mode Ciphers Enabled &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;71049 - SSH Weak MAC Algorithms Enabled &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;While checking certain things are not there from the firewall end but while checking using their Vulnerability Assessment tool they are having these mentioned output as above mentioned vulnerability.&lt;/P&gt;&lt;P&gt;Below is the firewall Output&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Firewall output:&lt;/P&gt;&lt;P&gt;# show deviceconfig system ssh ciphers mgmt&lt;BR /&gt;aes128-ctr;&lt;BR /&gt;aes128-gcm;&lt;BR /&gt;aes192-ctr;&lt;BR /&gt;aes256-ctr;&lt;BR /&gt;aes256-gcm;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;# show deviceconfig system ssh mac mgmt&lt;BR /&gt;&amp;#27; {&lt;BR /&gt;hmac-sha2-256;&lt;BR /&gt;hmac-sha2-512;&lt;/P&gt;&lt;P&gt;}&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Are the above mentioned Vulnerability is addressed in any other PAN OS version?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 27 May 2021 16:04:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/mitigation-recommendation-for-certain-vulnerability-assesment/m-p/409629#M1162</guid>
      <dc:creator>Vijaygvasan</dc:creator>
      <dc:date>2021-05-27T16:04:47Z</dc:date>
    </item>
    <item>
      <title>Re: Mitigation recommendation for certain vulnerability assesment done by VAPT team</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/mitigation-recommendation-for-certain-vulnerability-assesment/m-p/410397#M1163</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;Check out these posts/articles.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/general-topics/disable-weak-cipher-suites-for-ssl-tls-and-ssh/m-p/388126#M90458" target="_blank"&gt;https://live.paloaltonetworks.com/t5/general-topics/disable-weak-cipher-suites-for-ssl-tls-and-ssh/m-p/388126#M90458&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000CmqeCAC" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000CmqeCAC&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Tue, 01 Jun 2021 18:36:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/mitigation-recommendation-for-certain-vulnerability-assesment/m-p/410397#M1163</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2021-06-01T18:36:55Z</dc:date>
    </item>
    <item>
      <title>Re: Mitigation recommendation for certain vulnerability assesment done by VAPT team</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/mitigation-recommendation-for-certain-vulnerability-assesment/m-p/413815#M1183</link>
      <description>&lt;P&gt;Step 1: Conduct Risk Identification And Analysis.&lt;/P&gt;&lt;P&gt;Step 2:&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Vulnerability&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Scanning Policies and Procedures.&lt;/P&gt;&lt;P&gt;Step 3: Identify&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;The&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Types Of&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Vulnerability&amp;nbsp;&lt;/STRONG&gt;&lt;A href="https://www.mylonestar.online/" target="_self"&gt;mylonestar&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Scans.&lt;/P&gt;&lt;P&gt;Step 4: Configure&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;The&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Scan.&lt;/P&gt;&lt;P&gt;Step 5:&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Perform The&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Scan.&lt;/P&gt;&lt;P&gt;Step 6: Evaluate And Consider Possible Risks.&lt;/P&gt;&lt;P&gt;Step 7: Interpret&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;The&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Scan Results.&lt;/P&gt;</description>
      <pubDate>Tue, 22 Jun 2021 04:22:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/mitigation-recommendation-for-certain-vulnerability-assesment/m-p/413815#M1183</guid>
      <dc:creator>Lori5998</dc:creator>
      <dc:date>2021-06-22T04:22:54Z</dc:date>
    </item>
  </channel>
</rss>

