<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: RSA TLS crypto attack, ROBOT—short for &amp;quot;Return Of Bleichenbacher's Oracle Threat in Advanced Threat Prevention Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/rsa-tls-crypto-attack-robot-short-for-quot-return-of/m-p/192227#M134</link>
    <description>&lt;P&gt;Hi Curtis,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Many thanks for your feedback and for having contacted the support!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;That clarifies the situation &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Good to see that Palo is working on a fix.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You right I agree and appreciate as well their honesty.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks again and see you on the community threads.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 19 Dec 2017 09:16:11 GMT</pubDate>
    <dc:creator>FRVSA</dc:creator>
    <dc:date>2017-12-19T09:16:11Z</dc:date>
    <item>
      <title>RSA TLS crypto attack, ROBOT—short for "Return Of Bleichenbacher's Oracle Threat</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/rsa-tls-crypto-attack-robot-short-for-quot-return-of/m-p/191931#M128</link>
      <description>&lt;P&gt;Recent article talks about a newly discovered (but old) vulnerability:&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;A href="https://arstechnica.com/information-technology/2017/12/a-worrying-number-of-sites-remain-open-to-major-crypto-flaw-from-1998/?comments=1&amp;amp;start=40&amp;nbsp;" target="_blank"&gt;https://arstechnica.com/information-technology/2017/12/a-worrying-number-of-sites-remain-open-to-major-crypto-flaw-from-1998/?comments=1&amp;amp;start=40&amp;nbsp;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can test your links here if you are vulnerable:&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;A href="https://robotattack.org&amp;nbsp;" target="_blank"&gt;https://robotattack.org&amp;nbsp;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;With TLSv1.2, all my Palo Alto GlobalProtect interfaces check as vunerable.&lt;BR /&gt;Has anyone heard of this and is there a configuration that lessen the vulnerability?&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Thank you.&lt;/P&gt;</description>
      <pubDate>Fri, 15 Dec 2017 23:52:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/rsa-tls-crypto-attack-robot-short-for-quot-return-of/m-p/191931#M128</guid>
      <dc:creator>Margit_Curtis</dc:creator>
      <dc:date>2017-12-15T23:52:59Z</dc:date>
    </item>
    <item>
      <title>Re: RSA TLS crypto attack, ROBOT—short for "Return Of Bleichenbacher's Oracle Threat</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/rsa-tls-crypto-attack-robot-short-for-quot-return-of/m-p/192091#M129</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Same issue there. All our GlobalProtect portals seems to be&amp;nbsp;vulnerable even with the latest PANOS revision.&lt;/P&gt;&lt;P&gt;I've noticed that It only&amp;nbsp;affects&amp;nbsp;GlobalProtect portals bound with&amp;nbsp;SSL&amp;nbsp;certificates which do use the RSA algorithm.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The US-Cert has recently published an advisory: &lt;A href="http://www.kb.cert.org/vuls/id/144389" target="_blank"&gt;http://www.kb.cert.org/vuls/id/144389&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any advice would be appreciated.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Many thanks.&lt;/P&gt;</description>
      <pubDate>Mon, 18 Dec 2017 16:08:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/rsa-tls-crypto-attack-robot-short-for-quot-return-of/m-p/192091#M129</guid>
      <dc:creator>FRVSA</dc:creator>
      <dc:date>2017-12-18T16:08:45Z</dc:date>
    </item>
    <item>
      <title>Re: RSA TLS crypto attack, ROBOT—short for "Return Of Bleichenbacher's Oracle Threat</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/rsa-tls-crypto-attack-robot-short-for-quot-return-of/m-p/192129#M130</link>
      <description>&lt;P&gt;Hi, thanks for that link to the US-Cert alert. I was thinking that maybe the SSL certificate is the issue, but we have the same type of certificate on our Juniper\Pulse VLN interface, and that doesn't report vulnerable.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;I think most of us use the RSA type of certificate, as not all vendor issue ECC/ECDSA certificates, and maybe some issue with older browsers not supporting it. I like this site on it:&amp;nbsp;&lt;A href="https://wiki.mozilla.org/Security/Server_Side_TLS&amp;nbsp;" target="_blank"&gt;https://wiki.mozilla.org/Security/Server_Side_TLS&amp;nbsp;&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 18 Dec 2017 20:24:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/rsa-tls-crypto-attack-robot-short-for-quot-return-of/m-p/192129#M130</guid>
      <dc:creator>Margit_Curtis</dc:creator>
      <dc:date>2017-12-18T20:24:54Z</dc:date>
    </item>
    <item>
      <title>Re: RSA TLS crypto attack, ROBOT—short for "Return Of Bleichenbacher's Oracle Threat</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/rsa-tls-crypto-attack-robot-short-for-quot-return-of/m-p/192150#M131</link>
      <description>&lt;P&gt;Hi FRVSA,&lt;BR /&gt;&lt;BR /&gt;I've just got a confirmation from PA tech support:&lt;BR /&gt;"The PAN-OS is vulnerable and they are currently working towards a fix which prevents the attacker to exploit this vulnerability.&lt;BR /&gt;Currently they do not have a release timeline and this is currently marked as the highest priority possible. They are also working on determining if this will be a hot patch or released in an OS update."&lt;BR /&gt;&lt;BR /&gt;I do appreciate the honesty from PA tech support, and I hope the fix is out soon.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 18 Dec 2017 22:31:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/rsa-tls-crypto-attack-robot-short-for-quot-return-of/m-p/192150#M131</guid>
      <dc:creator>Margit_Curtis</dc:creator>
      <dc:date>2017-12-18T22:31:21Z</dc:date>
    </item>
    <item>
      <title>Re: RSA TLS crypto attack, ROBOT—short for "Return Of Bleichenbacher's Oracle Threat</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/rsa-tls-crypto-attack-robot-short-for-quot-return-of/m-p/192227#M134</link>
      <description>&lt;P&gt;Hi Curtis,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Many thanks for your feedback and for having contacted the support!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;That clarifies the situation &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Good to see that Palo is working on a fix.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You right I agree and appreciate as well their honesty.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks again and see you on the community threads.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 19 Dec 2017 09:16:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/rsa-tls-crypto-attack-robot-short-for-quot-return-of/m-p/192227#M134</guid>
      <dc:creator>FRVSA</dc:creator>
      <dc:date>2017-12-19T09:16:11Z</dc:date>
    </item>
    <item>
      <title>Re: RSA TLS crypto attack, ROBOT—short for "Return Of Bleichenbacher's Oracle Threat</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/rsa-tls-crypto-attack-robot-short-for-quot-return-of/m-p/193436#M139</link>
      <description>&lt;P&gt;Please note that we have posted the following advisory regarding ROBOT.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/Threat-Vulnerability-Articles/PAN-OS-exposure-to-ROBOT-attack/ta-p/192397" target="_blank"&gt;https://live.paloaltonetworks.com/t5/Threat-Vulnerability-Articles/PAN-OS-exposure-to-ROBOT-attack/ta-p/192397&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 29 Dec 2017 20:05:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/rsa-tls-crypto-attack-robot-short-for-quot-return-of/m-p/193436#M139</guid>
      <dc:creator>bvandivier</dc:creator>
      <dc:date>2017-12-29T20:05:13Z</dc:date>
    </item>
    <item>
      <title>Re: RSA TLS crypto attack, ROBOT—short for "Return Of Bleichenbacher's Oracle Threat</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/rsa-tls-crypto-attack-robot-short-for-quot-return-of/m-p/193545#M140</link>
      <description>&lt;P&gt;Hi Curtis - any idea if this fix will resolve findings on Global Protect portals using an RSA cert? Seems this mitigation / workaround statement only reflects fixes on the SSL Decryption Profiles.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://securityadvisories.paloaltonetworks.com/Home/Detail/117" target="_blank"&gt;https://securityadvisories.paloaltonetworks.com/Home/Detail/117&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jan 2018 20:54:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/rsa-tls-crypto-attack-robot-short-for-quot-return-of/m-p/193545#M140</guid>
      <dc:creator>scottyfresh</dc:creator>
      <dc:date>2018-01-02T20:54:52Z</dc:date>
    </item>
    <item>
      <title>Re: RSA TLS crypto attack, ROBOT—short for "Return Of Bleichenbacher's Oracle Threat</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/rsa-tls-crypto-attack-robot-short-for-quot-return-of/m-p/193549#M141</link>
      <description>&lt;P&gt;Hi Scotty,&lt;/P&gt;&lt;P&gt;The 757 contect update is giving some extra protection, but doesn't solve the problem.&lt;BR /&gt;I've done the update and our GP site still tests vulnerable.&amp;nbsp;&lt;BR /&gt;Their jugestion of switching to DHA type certificate is not an option for me at this time.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;It seems to me that they are coming out with an actual fix, with 8.0.7:&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.paloaltonetworks.com/documentation/80/pan-os/pan-os-release-notes/pan-os-8-0-7-addressed-issues#_49938&amp;nbsp;" target="_blank"&gt;https://www.paloaltonetworks.com/documentation/80/pan-os/pan-os-release-notes/pan-os-8-0-7-addressed-issues#_49938&amp;nbsp;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;PAN-89936&lt;BR /&gt;A security-related fix was made to prevent the decryption of captured sessions through the ROBOT attack (CVE-2017-17841).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But I haven't tested it yet.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Margit&lt;/P&gt;</description>
      <pubDate>Wed, 03 Jan 2018 00:19:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/rsa-tls-crypto-attack-robot-short-for-quot-return-of/m-p/193549#M141</guid>
      <dc:creator>Margit_Curtis</dc:creator>
      <dc:date>2018-01-03T00:19:54Z</dc:date>
    </item>
    <item>
      <title>Re: RSA TLS crypto attack, ROBOT—short for "Return Of Bleichenbacher's Oracle Threat</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/rsa-tls-crypto-attack-robot-short-for-quot-return-of/m-p/194304#M152</link>
      <description>&lt;P&gt;Hi Margit,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Same thing here - 757 has the signature and can be applied to a vulnerability protection profile, but external facing portals will still show the finding. We're running PanOS 7.1.11 and PanOS 8.0.7 is not an option for us at this time.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;They did update the mitigation notes to reflect issues with PanOS 7.1, but it's not clear.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Scott&lt;/P&gt;</description>
      <pubDate>Mon, 08 Jan 2018 18:14:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/rsa-tls-crypto-attack-robot-short-for-quot-return-of/m-p/194304#M152</guid>
      <dc:creator>scottyfresh</dc:creator>
      <dc:date>2018-01-08T18:14:18Z</dc:date>
    </item>
    <item>
      <title>Re: RSA TLS crypto attack, ROBOT—short for "Return Of Bleichenbacher's Oracle Threat</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/rsa-tls-crypto-attack-robot-short-for-quot-return-of/m-p/195888#M166</link>
      <description>&lt;P&gt;Hi Everyone,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;PANOS- 7.1.15 is out and the release note includes the following entrie:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;PAN-89936: A security‐related fix was made to prevent the decryption of captured sessions through the ROBOT attack (CVE‐2017‐17841).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I assume it solves the vulnerability exposition but not tested yet.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cheers.&lt;/P&gt;</description>
      <pubDate>Fri, 19 Jan 2018 10:54:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/rsa-tls-crypto-attack-robot-short-for-quot-return-of/m-p/195888#M166</guid>
      <dc:creator>FRVSA</dc:creator>
      <dc:date>2018-01-19T10:54:56Z</dc:date>
    </item>
  </channel>
</rss>

