<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SSL/TLS Client-Initiated Renegotiation Vulnerability in NGFW LAN Int in Advanced Threat Prevention Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/ssl-tls-client-initiated-renegotiation-vulnerability-in-ngfw-lan/m-p/504479#M1664</link>
    <description>&lt;P&gt;Hmmm.. My scans still show this as an issue after applying these settings.&lt;/P&gt;</description>
    <pubDate>Fri, 17 Jun 2022 13:45:39 GMT</pubDate>
    <dc:creator>PatrickMurphy</dc:creator>
    <dc:date>2022-06-17T13:45:39Z</dc:date>
    <item>
      <title>SSL/TLS Client-Initiated Renegotiation Vulnerability in NGFW LAN Int</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/ssl-tls-client-initiated-renegotiation-vulnerability-in-ngfw-lan/m-p/466853#M1506</link>
      <description>&lt;P&gt;Hi,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;One of our runs vulnerability&amp;nbsp; Assessment on LAN Interface of the PA NGFW, And they are getting&amp;nbsp;&lt;FONT face="arial black,avant garde"&gt;&lt;STRONG&gt;SSL/TLS Client-Initiated Renegotiation &lt;/STRONG&gt;&lt;/FONT&gt;vulnerability, Please help me to remediate the same.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 18 Feb 2022 18:53:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/ssl-tls-client-initiated-renegotiation-vulnerability-in-ngfw-lan/m-p/466853#M1506</guid>
      <dc:creator>SubaMuthuram</dc:creator>
      <dc:date>2022-02-18T18:53:46Z</dc:date>
    </item>
    <item>
      <title>Re: SSL/TLS Client-Initiated Renegotiation Vulnerability in NGFW LAN Int</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/ssl-tls-client-initiated-renegotiation-vulnerability-in-ngfw-lan/m-p/468669#M1519</link>
      <description>&lt;P&gt;You don't give much detail... but this is probably a renegotiation to lower TLS versions 1.0/1.1 that are vulnerable. Look at which SSL/TLS Profile you are using on your PA management interface:&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;Device -&amp;gt; Setup -&amp;gt; Management -&amp;gt; General Settings -&amp;gt; SSL/TLS Service Profile == &amp;lt;xxx&amp;gt;&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Then make sure your SSL/TLS profile is set to minimum TLS 1.2 (Note: Some older apps/browsers may not be able to handle this, so check if you are using the SSL/TLS profile for something else as well). Update the SSL/TLS profile:&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;Device -&amp;gt; Certificate Management -&amp;gt; SSL/TLS Service Profile -&amp;gt; &amp;lt;xxx&amp;gt; -&amp;gt; Min Version = 1.2&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 25 Feb 2022 15:31:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/ssl-tls-client-initiated-renegotiation-vulnerability-in-ngfw-lan/m-p/468669#M1519</guid>
      <dc:creator>Adrian_Jensen</dc:creator>
      <dc:date>2022-02-25T15:31:42Z</dc:date>
    </item>
    <item>
      <title>Re: SSL/TLS Client-Initiated Renegotiation Vulnerability in NGFW LAN Int</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/ssl-tls-client-initiated-renegotiation-vulnerability-in-ngfw-lan/m-p/476595#M1566</link>
      <description>&lt;P&gt;Thanks&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/184804"&gt;@Adrian_Jensen&lt;/a&gt;&amp;nbsp;,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have resolved with the same way.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 29 Mar 2022 11:48:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/ssl-tls-client-initiated-renegotiation-vulnerability-in-ngfw-lan/m-p/476595#M1566</guid>
      <dc:creator>SubaMuthuram</dc:creator>
      <dc:date>2022-03-29T11:48:54Z</dc:date>
    </item>
    <item>
      <title>Re: SSL/TLS Client-Initiated Renegotiation Vulnerability in NGFW LAN Int</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/ssl-tls-client-initiated-renegotiation-vulnerability-in-ngfw-lan/m-p/504479#M1664</link>
      <description>&lt;P&gt;Hmmm.. My scans still show this as an issue after applying these settings.&lt;/P&gt;</description>
      <pubDate>Fri, 17 Jun 2022 13:45:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/ssl-tls-client-initiated-renegotiation-vulnerability-in-ngfw-lan/m-p/504479#M1664</guid>
      <dc:creator>PatrickMurphy</dc:creator>
      <dc:date>2022-06-17T13:45:39Z</dc:date>
    </item>
    <item>
      <title>Re: SSL/TLS Client-Initiated Renegotiation Vulnerability in NGFW LAN Int</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/ssl-tls-client-initiated-renegotiation-vulnerability-in-ngfw-lan/m-p/504527#M1665</link>
      <description>&lt;P&gt;Do you have multiple certificate SSL/TLS profiles and you are alerting on one other than associated with the management port? I.e. a different profile for your GlobalProtect Portals and Gateways which are not a minimum of TLS&amp;gt;=1.2?&lt;/P&gt;</description>
      <pubDate>Fri, 17 Jun 2022 17:53:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/ssl-tls-client-initiated-renegotiation-vulnerability-in-ngfw-lan/m-p/504527#M1665</guid>
      <dc:creator>Adrian_Jensen</dc:creator>
      <dc:date>2022-06-17T17:53:25Z</dc:date>
    </item>
  </channel>
</rss>

