<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SSH protocol uses Weak  key exchange algorithms in PA 500 for PAN OS 8.1.14 in Advanced Threat Prevention Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/ssh-protocol-uses-weak-key-exchange-algorithms-in-pa-500-for-pan/m-p/520722#M1793</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/237306"&gt;@GlobalAxis&lt;/a&gt;&amp;nbsp;what PAN-OS version are you running?&lt;/P&gt;</description>
    <pubDate>Tue, 08 Nov 2022 23:02:58 GMT</pubDate>
    <dc:creator>mivaldi</dc:creator>
    <dc:date>2022-11-08T23:02:58Z</dc:date>
    <item>
      <title>SSH protocol uses Weak  key exchange algorithms in PA 500 for PAN OS 8.1.14</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/ssh-protocol-uses-weak-key-exchange-algorithms-in-pa-500-for-pan/m-p/327515#M817</link>
      <description>&lt;P&gt;Hi Team ,&lt;/P&gt;&lt;P&gt;&amp;nbsp; PA 500 with 8.1.14 (latest OS )&amp;nbsp; is having the Vulnerability&amp;nbsp;SSH protocol uses Weak key exchange algorithms. I understand we can change algorithm values with set deviceconfig system ssh kex&amp;nbsp; to stronger algorithm post 9.0 unfortunately PA 500 do not have 9.0 release in software download.&lt;/P&gt;&lt;P&gt;So how do we close this one , is there any alternative way we can change Kex values , or else we need&amp;nbsp; to compromise with this Vulnerability.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 May 2020 11:10:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/ssh-protocol-uses-weak-key-exchange-algorithms-in-pa-500-for-pan/m-p/327515#M817</guid>
      <dc:creator>Shashihm</dc:creator>
      <dc:date>2020-05-12T11:10:51Z</dc:date>
    </item>
    <item>
      <title>Re: SSH protocol uses Weak  key exchange algorithms in PA 500 for PAN OS 8.</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/ssh-protocol-uses-weak-key-exchange-algorithms-in-pa-500-for-pan/m-p/327518#M818</link>
      <description>&lt;P&gt;If you do not expose your management interface to an untrusted network (make it accessible inside MGMT network, set an ACL,..) you will be able to mitigate most exposure&lt;/P&gt;&lt;P&gt;If you must make the interface available, ensure connections need to traverse the firewall so you can apply security profiles to the connection&lt;/P&gt;</description>
      <pubDate>Tue, 12 May 2020 11:15:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/ssh-protocol-uses-weak-key-exchange-algorithms-in-pa-500-for-pan/m-p/327518#M818</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2020-05-12T11:15:21Z</dc:date>
    </item>
    <item>
      <title>Re: SSH protocol uses Weak  key exchange algorithms in PA 500 for PAN OS 8.</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/ssh-protocol-uses-weak-key-exchange-algorithms-in-pa-500-for-pan/m-p/327541#M819</link>
      <description>&lt;P&gt;TAC Engineer is suggesting to change the Firewall mode into FIPS-CC. Is it viable to change the Firewalls which are in production to FIPS-CC to mitigate this Vulnerability.&lt;/P&gt;</description>
      <pubDate>Tue, 12 May 2020 14:17:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/ssh-protocol-uses-weak-key-exchange-algorithms-in-pa-500-for-pan/m-p/327541#M819</guid>
      <dc:creator>Shashihm</dc:creator>
      <dc:date>2020-05-12T14:17:23Z</dc:date>
    </item>
    <item>
      <title>Re: SSH protocol uses Weak  key exchange algorithms in PA 500 for PAN OS 8.</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/ssh-protocol-uses-weak-key-exchange-algorithms-in-pa-500-for-pan/m-p/327599#M820</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;You might want to read up on what is truly disabled via FIPS mode. Also here is an article on disabling weak ciphers.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000PMNPCA4" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000PMNPCA4&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cheers!&lt;/P&gt;</description>
      <pubDate>Tue, 12 May 2020 18:39:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/ssh-protocol-uses-weak-key-exchange-algorithms-in-pa-500-for-pan/m-p/327599#M820</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2020-05-12T18:39:39Z</dc:date>
    </item>
    <item>
      <title>Re: SSH protocol uses Weak  key exchange algorithms in PA 500 for PAN OS 8.</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/ssh-protocol-uses-weak-key-exchange-algorithms-in-pa-500-for-pan/m-p/327669#M821</link>
      <description>&lt;P&gt;Try this:&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="courier new,courier"&gt;# configure&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;# delete deviceconfig system ssh&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;# set deviceconfig system ssh ciphers mgmt aes256-ctr&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;# set deviceconfig system ssh default-hostkey mgmt key-type ECDSA 256&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;# set deviceconfig system ssh regenerate-hostkeys mgmt key-type ECDSA key-length 256&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;# set deviceconfig system ssh session-rekey mgmt interval 3600&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;# set deviceconfig system ssh mac mgmt hmac-sha2-256&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;# commit&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;# exit&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&amp;gt; set ssh service-restart mgmt&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 May 2020 23:51:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/ssh-protocol-uses-weak-key-exchange-algorithms-in-pa-500-for-pan/m-p/327669#M821</guid>
      <dc:creator>mivaldi</dc:creator>
      <dc:date>2020-05-12T23:51:53Z</dc:date>
    </item>
    <item>
      <title>Re: SSH protocol uses Weak  key exchange algorithms in PA 500 for PAN OS 8.1.14</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/ssh-protocol-uses-weak-key-exchange-algorithms-in-pa-500-for-pan/m-p/520405#M1792</link>
      <description>&lt;P&gt;Dear all ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Can I have GUI tips for fixing the same&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 05 Nov 2022 05:16:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/ssh-protocol-uses-weak-key-exchange-algorithms-in-pa-500-for-pan/m-p/520405#M1792</guid>
      <dc:creator>GlobalAxis</dc:creator>
      <dc:date>2022-11-05T05:16:59Z</dc:date>
    </item>
    <item>
      <title>Re: SSH protocol uses Weak  key exchange algorithms in PA 500 for PAN OS 8.1.14</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/ssh-protocol-uses-weak-key-exchange-algorithms-in-pa-500-for-pan/m-p/520722#M1793</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/237306"&gt;@GlobalAxis&lt;/a&gt;&amp;nbsp;what PAN-OS version are you running?&lt;/P&gt;</description>
      <pubDate>Tue, 08 Nov 2022 23:02:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/ssh-protocol-uses-weak-key-exchange-algorithms-in-pa-500-for-pan/m-p/520722#M1793</guid>
      <dc:creator>mivaldi</dc:creator>
      <dc:date>2022-11-08T23:02:58Z</dc:date>
    </item>
  </channel>
</rss>

