<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Does vulnerability-CVE-2023-51385 have any impact on PanOS firewalls, Panorama or Wildfire? in Advanced Threat Prevention Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/does-vulnerability-cve-2023-51385-have-any-impact-on-panos/m-p/588129#M2228</link>
    <description>&lt;P&gt;I would tend to believe the&amp;nbsp;Palo Alto Networks Product Security Assurance team's assessment listed above, not least because a quick read of the &lt;SPAN&gt;OpenSSH&lt;/SPAN&gt; fix for this CVE at&amp;nbsp;&lt;A href="https://www.openssh.com/txt/release-9.6" target="_blank"&gt;https://www.openssh.com/txt/release-9.6&lt;/A&gt;&amp;nbsp;indicates it's only a vulnerability when a "ProxyCommand,&amp;nbsp;LocalCommand directive or 'match exec' predicate reference[s] the&amp;nbsp;user or hostname via %u, %h or similar expansion token..."&lt;BR /&gt;&lt;BR /&gt;I'm trying to imagine a scenario where the PAN-OS implementation of &lt;SPAN&gt;OpenSSH&lt;/SPAN&gt; would have ever wanted to use those directives/predicates in their conf file(s) anyway....&lt;BR /&gt;&lt;BR /&gt;But I hear you on the discrepancy coming from different parts of the vendor's organization. If you wanted to be absolutely sure, you could open a new TAC case referencing the original case and some of the references above, and request clarification from TAC?&lt;/P&gt;</description>
    <pubDate>Tue, 28 May 2024 17:07:10 GMT</pubDate>
    <dc:creator>lwalcher</dc:creator>
    <dc:date>2024-05-28T17:07:10Z</dc:date>
    <item>
      <title>Does vulnerability-CVE-2023-51385 have any impact on PanOS firewalls, Panorama or Wildfire?</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/does-vulnerability-cve-2023-51385-have-any-impact-on-panos/m-p/570868#M2069</link>
      <description>&lt;P&gt;&lt;SPAN&gt;In ssh in OpenSSH before 9.6, OS command injection might occur if a user name or host name has shell metacharacters, and this name is referenced by an expansion token in certain situations. For example, an untrusted Git repository can have a submodule with shell metacharacters in a user name or host name.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 26 Dec 2023 13:27:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/does-vulnerability-cve-2023-51385-have-any-impact-on-panos/m-p/570868#M2069</guid>
      <dc:creator>Netdata1</dc:creator>
      <dc:date>2023-12-26T13:27:32Z</dc:date>
    </item>
    <item>
      <title>Re: Does vulnerability-CVE-2023-51385 have any impact on PanOS firewalls, Panorama or Wildfire?</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/does-vulnerability-cve-2023-51385-have-any-impact-on-panos/m-p/570905#M2070</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/222745"&gt;@Netdata1&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;PAN-OS is not affected by this vulnerability. As per OSS listing:&amp;nbsp;&lt;A href="https://docs.paloaltonetworks.com/oss-listings/pan-os-oss-listings/pan-os-11-0-open-source-software-oss-listing" target="_self"&gt;OSS Listing&lt;/A&gt;&amp;nbsp;even latest PAN-OS is running&amp;nbsp;OpenSSH 8.0p1, while this vulnerability affects versions&amp;nbsp;9.0p1 – 9.5p1.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kind Regards&lt;/P&gt;
&lt;P&gt;Pavel&lt;/P&gt;</description>
      <pubDate>Mon, 26 Feb 2024 05:44:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/does-vulnerability-cve-2023-51385-have-any-impact-on-panos/m-p/570905#M2070</guid>
      <dc:creator>PavelK</dc:creator>
      <dc:date>2024-02-26T05:44:43Z</dc:date>
    </item>
    <item>
      <title>Re: Does vulnerability-CVE-2023-51385 have any impact on PanOS firewalls, Panorama or Wildfire?</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/does-vulnerability-cve-2023-51385-have-any-impact-on-panos/m-p/578035#M2100</link>
      <description>&lt;P&gt;Hi PavelK,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV class="flex flex-grow flex-col max-w-full"&gt;
&lt;DIV class="min-h-[20px] text-message flex flex-col items-start gap-3 whitespace-pre-wrap break-words [.text-message+&amp;amp;]:mt-5 overflow-x-auto" data-message-author-role="assistant" data-message-id="22a2a1b2-bfda-4a79-9eff-c29e93de7585"&gt;
&lt;DIV class="markdown prose w-full break-words dark:prose-invert dark"&gt;
&lt;P&gt;The KB article you provided contains a different CVE number. Please verify its accuracy. If the provided information is correct, kindly provide the rationale behind sharing that particular KB&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;regards,&lt;/P&gt;
&lt;P&gt;Akash Thangavel&lt;/P&gt;
&lt;P&gt;Network Security Engineer&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;</description>
      <pubDate>Thu, 22 Feb 2024 08:02:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/does-vulnerability-cve-2023-51385-have-any-impact-on-panos/m-p/578035#M2100</guid>
      <dc:creator>AkashThangavel</dc:creator>
      <dc:date>2024-02-22T08:02:10Z</dc:date>
    </item>
    <item>
      <title>Re: Does vulnerability-CVE-2023-51385 have any impact on PanOS firewalls, Panorama or Wildfire?</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/does-vulnerability-cve-2023-51385-have-any-impact-on-panos/m-p/578296#M2102</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/230645"&gt;@AkashThangavel&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;you are correct. The link for KB I provided was indeed incorrect. I have already edited my original post. Thank you for pointing this out!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kind Regards&lt;/P&gt;
&lt;P&gt;Pavel&lt;/P&gt;</description>
      <pubDate>Mon, 26 Feb 2024 05:49:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/does-vulnerability-cve-2023-51385-have-any-impact-on-panos/m-p/578296#M2102</guid>
      <dc:creator>PavelK</dc:creator>
      <dc:date>2024-02-26T05:49:33Z</dc:date>
    </item>
    <item>
      <title>Re: Does vulnerability-CVE-2023-51385 have any impact on PanOS firewalls, Panorama or Wildfire?</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/does-vulnerability-cve-2023-51385-have-any-impact-on-panos/m-p/583028#M2153</link>
      <description>&lt;P&gt;Where does the vulnerability say 9.0p1 – 9.5p1?&amp;nbsp;&amp;nbsp; According to NIST, it is "OpenSSH before 9.6".&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://nvd.nist.gov/vuln/detail/CVE-2023-51385" target="_blank"&gt;https://nvd.nist.gov/vuln/detail/CVE-2023-51385&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 09 Apr 2024 09:43:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/does-vulnerability-cve-2023-51385-have-any-impact-on-panos/m-p/583028#M2153</guid>
      <dc:creator>ivanemoore</dc:creator>
      <dc:date>2024-04-09T09:43:06Z</dc:date>
    </item>
    <item>
      <title>Re: Does vulnerability-CVE-2023-51385 have any impact on PanOS firewalls, Panorama or Wildfire?</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/does-vulnerability-cve-2023-51385-have-any-impact-on-panos/m-p/583113#M2155</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/142360"&gt;@ivanemoore&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;thanks for post.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can find details for&amp;nbsp;CVE-2023-51385 here:&amp;nbsp;&lt;A href="https://www.cybersecurity-help.cz/vdb/SB2023121905" target="_blank"&gt;https://www.cybersecurity-help.cz/vdb/SB2023121905&lt;/A&gt;. I had the same impression that anything below 9.6 is affected, however this does not seem to be case. In the past I opened a TAC ticket for this and could confirm that PAN-OS is not affected by this vulnerability.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kind Regards&lt;/P&gt;
&lt;P&gt;Pavel&lt;/P&gt;</description>
      <pubDate>Tue, 09 Apr 2024 23:27:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/does-vulnerability-cve-2023-51385-have-any-impact-on-panos/m-p/583113#M2155</guid>
      <dc:creator>PavelK</dc:creator>
      <dc:date>2024-04-09T23:27:59Z</dc:date>
    </item>
    <item>
      <title>Re: Does vulnerability-CVE-2023-51385 have any impact on PanOS firewalls, Panorama or Wildfire?</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/does-vulnerability-cve-2023-51385-have-any-impact-on-panos/m-p/586696#M2217</link>
      <description>&lt;P&gt;Interesting.&amp;nbsp; I got back this:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-left lia-indent-padding-left-30px"&gt;Our Team has performed assessment&amp;nbsp;for CVE 2023-51385 on our PAN-OS versions&amp;nbsp;&lt;BR /&gt;The CVE is impacted PANOS 10.2&amp;nbsp; and above which includes 11.2, 11.1, 11.0 and 10.2 as Redhat mentioned it is affected to RHEL8 which is using for 10.2 and above.&amp;nbsp; We are also in the&amp;nbsp;process of getting the&amp;nbsp;fixes in each pan os trains.&lt;/P&gt;
&lt;P class="lia-align-left lia-indent-padding-left-30px"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 14 May 2024 19:19:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/does-vulnerability-cve-2023-51385-have-any-impact-on-panos/m-p/586696#M2217</guid>
      <dc:creator>ivanemoore</dc:creator>
      <dc:date>2024-05-14T19:19:49Z</dc:date>
    </item>
    <item>
      <title>Re: Does vulnerability-CVE-2023-51385 have any impact on PanOS firewalls, Panorama or Wildfire?</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/does-vulnerability-cve-2023-51385-have-any-impact-on-panos/m-p/587214#M2219</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/142360"&gt;@ivanemoore&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;thank you for update on this topic.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It looks like the information you shared is more up to date. Did Palo Alto mention whether they are going to list this vulnerability in security advisory?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kind Regards&lt;/P&gt;
&lt;P&gt;Pavel&lt;/P&gt;</description>
      <pubDate>Sun, 19 May 2024 21:47:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/does-vulnerability-cve-2023-51385-have-any-impact-on-panos/m-p/587214#M2219</guid>
      <dc:creator>PavelK</dc:creator>
      <dc:date>2024-05-19T21:47:05Z</dc:date>
    </item>
    <item>
      <title>Re: Does vulnerability-CVE-2023-51385 have any impact on PanOS firewalls, Panorama or Wildfire?</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/does-vulnerability-cve-2023-51385-have-any-impact-on-panos/m-p/588119#M2226</link>
      <description>&lt;P data-unlink="true"&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/192693"&gt;@PavelK&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/142360"&gt;@ivanemoore&lt;/a&gt;:&lt;BR /&gt;&lt;BR /&gt;The &lt;A href="https://security.paloaltonetworks.com/PAN-SA-2024-0001" target="_self"&gt;https://security.paloaltonetworks.com/PAN-SA-2024-0001&lt;/A&gt;&amp;nbsp;Security Advisory claims the following for CVE-2023-51385: "&lt;SPAN&gt;The ssh configuration file on PAN-OS does not contain the vulnerable configuration settings. Therefore, PAN-OS is not affected."&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 28 May 2024 15:40:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/does-vulnerability-cve-2023-51385-have-any-impact-on-panos/m-p/588119#M2226</guid>
      <dc:creator>lwalcher</dc:creator>
      <dc:date>2024-05-28T15:40:51Z</dc:date>
    </item>
    <item>
      <title>Re: Does vulnerability-CVE-2023-51385 have any impact on PanOS firewalls, Panorama or Wildfire?</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/does-vulnerability-cve-2023-51385-have-any-impact-on-panos/m-p/588120#M2227</link>
      <description>&lt;P&gt;So, basically, Palo Alto is conflicting with themselves and don't know what they heck they are saying.&amp;nbsp; Great.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 28 May 2024 15:42:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/does-vulnerability-cve-2023-51385-have-any-impact-on-panos/m-p/588120#M2227</guid>
      <dc:creator>ivanemoore</dc:creator>
      <dc:date>2024-05-28T15:42:58Z</dc:date>
    </item>
    <item>
      <title>Re: Does vulnerability-CVE-2023-51385 have any impact on PanOS firewalls, Panorama or Wildfire?</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/does-vulnerability-cve-2023-51385-have-any-impact-on-panos/m-p/588129#M2228</link>
      <description>&lt;P&gt;I would tend to believe the&amp;nbsp;Palo Alto Networks Product Security Assurance team's assessment listed above, not least because a quick read of the &lt;SPAN&gt;OpenSSH&lt;/SPAN&gt; fix for this CVE at&amp;nbsp;&lt;A href="https://www.openssh.com/txt/release-9.6" target="_blank"&gt;https://www.openssh.com/txt/release-9.6&lt;/A&gt;&amp;nbsp;indicates it's only a vulnerability when a "ProxyCommand,&amp;nbsp;LocalCommand directive or 'match exec' predicate reference[s] the&amp;nbsp;user or hostname via %u, %h or similar expansion token..."&lt;BR /&gt;&lt;BR /&gt;I'm trying to imagine a scenario where the PAN-OS implementation of &lt;SPAN&gt;OpenSSH&lt;/SPAN&gt; would have ever wanted to use those directives/predicates in their conf file(s) anyway....&lt;BR /&gt;&lt;BR /&gt;But I hear you on the discrepancy coming from different parts of the vendor's organization. If you wanted to be absolutely sure, you could open a new TAC case referencing the original case and some of the references above, and request clarification from TAC?&lt;/P&gt;</description>
      <pubDate>Tue, 28 May 2024 17:07:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/does-vulnerability-cve-2023-51385-have-any-impact-on-panos/m-p/588129#M2228</guid>
      <dc:creator>lwalcher</dc:creator>
      <dc:date>2024-05-28T17:07:10Z</dc:date>
    </item>
    <item>
      <title>Re: Does vulnerability-CVE-2023-51385 have any impact on PanOS firewalls, Panorama or Wildfire?</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/does-vulnerability-cve-2023-51385-have-any-impact-on-panos/m-p/999291#M2390</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;May I know if there is any operational impact regarding this upgrade to OPENSSH 9.6 or later&lt;/P&gt;</description>
      <pubDate>Mon, 23 Dec 2024 08:02:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/does-vulnerability-cve-2023-51385-have-any-impact-on-panos/m-p/999291#M2390</guid>
      <dc:creator>S.Ho323833</dc:creator>
      <dc:date>2024-12-23T08:02:49Z</dc:date>
    </item>
    <item>
      <title>Re: Does vulnerability-CVE-2023-51385 have any impact on PanOS firewalls, Panorama or Wildfire?</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/does-vulnerability-cve-2023-51385-have-any-impact-on-panos/m-p/999394#M2391</link>
      <description>&lt;P&gt;We cannot upgrade OpenSSH separately in our PAN-OS version. The maximum OpenSSH version supported in our latest PAN-OS version (8.0p1) is as follows:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AkashThangavel_0-1735019718498.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/64916i3D57DCB5B1CC7E0B/image-size/medium?v=v2&amp;amp;px=400" role="button" title="AkashThangavel_0-1735019718498.png" alt="AkashThangavel_0-1735019718498.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;If you believe this OpenSSH version is vulnerable, please check with TAC for confirmation that the CVE number for OpenSSH will not affect our environment.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/oss-listings/pan-os-oss-listings/pan-os-11-0-open-source-software-oss-listing" target="_self"&gt;https://docs.paloaltonetworks.com/oss-listings/pan-os-oss-listings/pan-os-11-0-open-source-software-oss-listing&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;regards,&lt;/P&gt;
&lt;P&gt;Akash Thangavel&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Dec 2024 05:59:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/does-vulnerability-cve-2023-51385-have-any-impact-on-panos/m-p/999394#M2391</guid>
      <dc:creator>AkashThangavel</dc:creator>
      <dc:date>2024-12-24T05:59:03Z</dc:date>
    </item>
  </channel>
</rss>

