<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PanOS 11.1.5 (and others with the fix for CVE-2024-2550) still not preferred? in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/panos-11-1-5-and-others-with-the-fix-for-cve-2024-2550-still-not/m-p/1220132#M123245</link>
    <description>&lt;P data-start="115" data-end="132"&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/136696"&gt;@ccvega&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P data-start="115" data-end="132"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-start="134" data-end="489"&gt;The timing of when a PAN-OS version is marked as &lt;EM data-start="183" data-end="194"&gt;preferred&lt;/EM&gt; is determined by the Support organization, but there is no set timeline for this. The process is very comprehensive. If a particular CVE is a significant concern for your organization, I recommend reviewing the release notes of the PAN-OS versions that address the vulnerability and assessing the potential impact of upgrading.&lt;/P&gt;
&lt;P data-start="134" data-end="489"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-start="491" data-end="769"&gt;There's no need to delay an upgrade because a version hasn’t been marked as &lt;EM data-start="574" data-end="585"&gt;preferred&lt;/EM&gt;, especially if it contains a fix for a critical CVE. Support &lt;EM data-start="647" data-end="658"&gt;preferred&lt;/EM&gt; versions are determined broadly and does not align with specific deployments or risk profile.&lt;/P&gt;
&lt;P data-start="491" data-end="769"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-start="771" data-end="939"&gt;Take a look at the&amp;nbsp;&lt;A rel="noopener" data-start="795" data-end="844" target="_blank"&gt;11.1.5 Known Issues&lt;/A&gt;&amp;nbsp;or any releases you would like to jump to and compare them against the potential risk of CVE-2024-2550 to make an informed decision.&lt;/P&gt;
&lt;P data-start="941" data-end="987"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 12 Feb 2025 07:14:07 GMT</pubDate>
    <dc:creator>JayGolf</dc:creator>
    <dc:date>2025-02-12T07:14:07Z</dc:date>
    <item>
      <title>PanOS 11.1.5 (and others with the fix for CVE-2024-2550) still not preferred?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/panos-11-1-5-and-others-with-the-fix-for-cve-2024-2550-still-not/m-p/1220017#M123238</link>
      <description>&lt;P&gt;Might anyone know why 11.1.5 and&amp;nbsp;&lt;SPAN&gt;10.2.10-h10 (or anything newer) are still not marked as preferred 3 months after release?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We're on 10.2.x now and likely would upgrade to 11.1.x, but I figured waiting for the patch for&amp;nbsp;CVE-2024-2550 makes sense.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://security.paloaltonetworks.com/CVE-2024-2550" target="_blank"&gt;CVE-2024-2550 PAN-OS: Firewall Denial of Service (DoS) in GlobalProtect Gateway Using a Specially Crafted Packet&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 11 Feb 2025 15:26:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/panos-11-1-5-and-others-with-the-fix-for-cve-2024-2550-still-not/m-p/1220017#M123238</guid>
      <dc:creator>ccvega</dc:creator>
      <dc:date>2025-02-11T15:26:12Z</dc:date>
    </item>
    <item>
      <title>Re: PanOS 11.1.5 (and others with the fix for CVE-2024-2550) still not preferred?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/panos-11-1-5-and-others-with-the-fix-for-cve-2024-2550-still-not/m-p/1220132#M123245</link>
      <description>&lt;P data-start="115" data-end="132"&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/136696"&gt;@ccvega&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P data-start="115" data-end="132"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-start="134" data-end="489"&gt;The timing of when a PAN-OS version is marked as &lt;EM data-start="183" data-end="194"&gt;preferred&lt;/EM&gt; is determined by the Support organization, but there is no set timeline for this. The process is very comprehensive. If a particular CVE is a significant concern for your organization, I recommend reviewing the release notes of the PAN-OS versions that address the vulnerability and assessing the potential impact of upgrading.&lt;/P&gt;
&lt;P data-start="134" data-end="489"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-start="491" data-end="769"&gt;There's no need to delay an upgrade because a version hasn’t been marked as &lt;EM data-start="574" data-end="585"&gt;preferred&lt;/EM&gt;, especially if it contains a fix for a critical CVE. Support &lt;EM data-start="647" data-end="658"&gt;preferred&lt;/EM&gt; versions are determined broadly and does not align with specific deployments or risk profile.&lt;/P&gt;
&lt;P data-start="491" data-end="769"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-start="771" data-end="939"&gt;Take a look at the&amp;nbsp;&lt;A rel="noopener" data-start="795" data-end="844" target="_blank"&gt;11.1.5 Known Issues&lt;/A&gt;&amp;nbsp;or any releases you would like to jump to and compare them against the potential risk of CVE-2024-2550 to make an informed decision.&lt;/P&gt;
&lt;P data-start="941" data-end="987"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 12 Feb 2025 07:14:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/panos-11-1-5-and-others-with-the-fix-for-cve-2024-2550-still-not/m-p/1220132#M123245</guid>
      <dc:creator>JayGolf</dc:creator>
      <dc:date>2025-02-12T07:14:07Z</dc:date>
    </item>
  </channel>
</rss>

