<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Qualys scanner reporting OpenSSH Authentication Bypass Vulnerability in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/qualys-scanner-reporting-openssh-authentication-bypass/m-p/578230#M115987</link>
    <description>&lt;TABLE&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD class="label"&gt;Model&lt;/TD&gt;
&lt;TD class="data"&gt;PA-3220&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;TABLE&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD class="label"&gt;Software Version&lt;/TD&gt;
&lt;TD class="data"&gt;10.2.8&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;Qualys scanner reporting OpenSSH Authentication Bypass Vulnerability&lt;/P&gt;
&lt;P&gt;Customers are advised to upgrade to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://www.openssh.com/releasenotes.html#9.6p1" target="_blank" rel="noopener"&gt;OpenSSH 9.6p1&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;or later to remediate this vulnerability.&lt;/P&gt;
&lt;P&gt;Patch&lt;/P&gt;
&lt;P&gt;Is this a true issue or false positive?&lt;/P&gt;</description>
    <pubDate>Fri, 23 Feb 2024 21:39:14 GMT</pubDate>
    <dc:creator>GaryBrand</dc:creator>
    <dc:date>2024-02-23T21:39:14Z</dc:date>
    <item>
      <title>Qualys scanner reporting OpenSSH Authentication Bypass Vulnerability</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/qualys-scanner-reporting-openssh-authentication-bypass/m-p/578230#M115987</link>
      <description>&lt;TABLE&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD class="label"&gt;Model&lt;/TD&gt;
&lt;TD class="data"&gt;PA-3220&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;TABLE&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD class="label"&gt;Software Version&lt;/TD&gt;
&lt;TD class="data"&gt;10.2.8&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;Qualys scanner reporting OpenSSH Authentication Bypass Vulnerability&lt;/P&gt;
&lt;P&gt;Customers are advised to upgrade to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://www.openssh.com/releasenotes.html#9.6p1" target="_blank" rel="noopener"&gt;OpenSSH 9.6p1&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;or later to remediate this vulnerability.&lt;/P&gt;
&lt;P&gt;Patch&lt;/P&gt;
&lt;P&gt;Is this a true issue or false positive?&lt;/P&gt;</description>
      <pubDate>Fri, 23 Feb 2024 21:39:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/qualys-scanner-reporting-openssh-authentication-bypass/m-p/578230#M115987</guid>
      <dc:creator>GaryBrand</dc:creator>
      <dc:date>2024-02-23T21:39:14Z</dc:date>
    </item>
    <item>
      <title>Re: Qualys scanner reporting OpenSSH Authentication Bypass Vulnerability</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/qualys-scanner-reporting-openssh-authentication-bypass/m-p/578415#M116014</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/70373"&gt;@GaryBrand&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is there a CVE included with the vulnerability? With any news regarding vulnerabilities, I would recommend verifying your source as well as researching the associated CVE.&amp;nbsp;&lt;SPAN&gt;Security advisories issued by vendors and researchers almost always mention at least one CVE ID.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;If you take a look at OpenSSH security page there is a vulnerability reported on &lt;A href="https://www.openssh.com/security.html" target="_self"&gt;July 19th by the Qualys team&lt;/A&gt; that is assigned&amp;nbsp;CVE-2023-38408.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 27 Feb 2024 04:14:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/qualys-scanner-reporting-openssh-authentication-bypass/m-p/578415#M116014</guid>
      <dc:creator>JayGolf</dc:creator>
      <dc:date>2024-02-27T04:14:41Z</dc:date>
    </item>
  </channel>
</rss>

