<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PCI Vulnerabilities Report in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/pci-vulnerabilities-report/m-p/33367#M24448</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok thanks steven.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1 more question: we have upgraded version 6.1.2 on PA and disable SSLV3 point as per PCI.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But now PCI want to enable PA firewall management console on TSL.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;is this done after disabling SSLV3?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 08 Apr 2015 13:35:50 GMT</pubDate>
    <dc:creator>NickySorot</dc:creator>
    <dc:date>2015-04-08T13:35:50Z</dc:date>
    <item>
      <title>PCI Vulnerabilities Report</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pci-vulnerabilities-report/m-p/33354#M24435</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Dear Friends, &lt;A href="https://live.paloaltonetworks.com/u1/12079"&gt;panos&lt;/A&gt;, &lt;A href="https://live.paloaltonetworks.com/u1/9105"&gt;panagent&lt;/A&gt; &lt;A href="https://live.paloaltonetworks.com/u1/19491"&gt;HULK&lt;/A&gt; &lt;A href="https://live.paloaltonetworks.com/u1/19490"&gt;hshah&lt;/A&gt; &lt;A href="https://live.paloaltonetworks.com/u1/17985"&gt;Steven Puluka&lt;/A&gt; &lt;A href="https://live.paloaltonetworks.com/u1/16909"&gt;hyadavalli&lt;/A&gt; &lt;A href="https://live.paloaltonetworks.com/u1/28677"&gt;mmmccorkle&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Verdana, Arial, Tahoma, Calibri, Geneva, sans-serif; font-size: 11.6999998092651px;"&gt;I have a doubt regarding PCI vulnerabilities scan and enable the signature for the same. when security team scan our WAN interface. he found below &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. SSL Certificate - Self-Signed Certificate&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;VULNERABILITY DETAILS&lt;/P&gt;&lt;P&gt;CVSS Base Score: 9.4&lt;/P&gt;&lt;P&gt;CVSS Temporal Score: 6.9&lt;/P&gt;&lt;P&gt;Severity: 2&lt;/P&gt;&lt;P&gt;QID: 38169&lt;/P&gt;&lt;P&gt;Category: General remote services&lt;/P&gt;&lt;P&gt;CVE ID: -&lt;/P&gt;&lt;P&gt;Vendor Reference: -&lt;/P&gt;&lt;P&gt;Bugtraq ID: -&lt;/P&gt;&lt;P&gt;Last Update: 05/25/2009&lt;/P&gt;&lt;P&gt;THREAT:&lt;/P&gt;&lt;P&gt;An SSL Certificate associates an entity (person, organization, host, etc.) with a Public Key. In an SSL connection, the client authenticates the remote&lt;/P&gt;&lt;P&gt;server using the server's Certificate and extracts the Public Key in the Certificate to establish the secure connection.&lt;/P&gt;&lt;P&gt;The client can trust that the Server Certificate belongs the server only if it is signed by a mutually trusted third-party Certificate Authority (CA). Selfsigned&lt;/P&gt;&lt;P&gt;certificates are created generally for testing purposes or to avoid paying third-party CAs. These should not be used on any production or&lt;/P&gt;&lt;P&gt;critical servers.By exploiting this vulnerability, an attacker can impersonate the server by presenting a fake self-signed certificate. If the client knows that the server does not have a trusted certificate, it will accept this spoofed certificate and communicate with the remote server.&lt;/P&gt;&lt;P&gt;IMPACT:By exploiting this vulnerability, an attacker can launch a man-in-the-middle attack.&lt;/P&gt;&lt;P&gt;SOLUTION:Please install a server certificate signed by a trusted third-party Certificate Authority.&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;RESULT: Certificate #0 &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:emailAddress=support@paloaltonetworks.com"&gt;emailAddress=support@paloaltonetworks.com&lt;/A&gt;&lt;SPAN&gt;,CN=localhost,OU=Support,O=Palo_Alto_Networks,L=Sunnyvale,ST=CA,C=US is a self signed certificate.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. SSL Certificate - Signature Verification Failed Vulnerability&amp;nbsp;&amp;nbsp; port 443/tcp over SSL&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;VULNERABILITY DETAILS&lt;/P&gt;&lt;P&gt;CVSS Base Score: 9.4&lt;/P&gt;&lt;P&gt;CVSS Temporal Score: 6.9&lt;/P&gt;&lt;P&gt;Severity: 2&lt;/P&gt;&lt;P&gt;QID: 38173&lt;/P&gt;&lt;P&gt;Category: General remote services&lt;/P&gt;&lt;P&gt;CVE ID: -&lt;/P&gt;&lt;P&gt;Vendor Reference: -&lt;/P&gt;&lt;P&gt;Bugtraq ID: -&lt;/P&gt;&lt;P&gt;Last Update: 05/23/2009&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3. SSL Certificate - Self-Signed Certificate&amp;nbsp; port 4443/tcp over SSL&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;VULNERABILITY DETAILS&lt;/P&gt;&lt;P&gt;CVSS Base Score: 9.4&lt;/P&gt;&lt;P&gt;CVSS Temporal Score: 6.9&lt;/P&gt;&lt;P&gt;Severity: 2&lt;/P&gt;&lt;P&gt;QID: 38169&lt;/P&gt;&lt;P&gt;Category: General remote services&lt;/P&gt;&lt;P&gt;CVE ID: -&lt;/P&gt;&lt;P&gt;Vendor Reference: -&lt;/P&gt;&lt;P&gt;Bugtraq ID: -&lt;/P&gt;&lt;P&gt;Last Update: 05/25/2009&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;4. OpenSSH Local SCP Shell Command Execution Vulnerability (FEDORA-2006-056, Vmware-3069097-Patch,Vmware-9986131-Patch)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;VULNERABILITY DETAILS&lt;/P&gt;&lt;P&gt;CVSS Base Score: 4.6&lt;/P&gt;&lt;P&gt;CVSS Temporal Score: 3.5&lt;/P&gt;&lt;P&gt;Severity: 3&lt;/P&gt;&lt;P&gt;QID: 115317&lt;/P&gt;&lt;P&gt;Category: Local&lt;/P&gt;&lt;P&gt;CVE ID: CVE-2006-0225&lt;/P&gt;&lt;P&gt;Vendor Reference: OpenSSH, FEDORA-2006-056, Vmware-3069097-Patch, Vmware-9986131-Patch&lt;/P&gt;&lt;P&gt;Bugtraq ID: 16369&lt;/P&gt;&lt;P&gt;Last Update: 06/17/2010&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i have checked below reference &lt;A href="https://live.paloaltonetworks.com/thread/12592"&gt;I Need help for SSLV3 disable&lt;/A&gt; but not yet answered. please suggest me for the same. i am using PAN OS 6.1.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Satish&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Mar 2015 08:34:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pci-vulnerabilities-report/m-p/33354#M24435</guid>
      <dc:creator>Satish</dc:creator>
      <dc:date>2015-03-27T08:34:34Z</dc:date>
    </item>
    <item>
      <title>Re: PCI Vulnerabilities Report</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pci-vulnerabilities-report/m-p/33355#M24436</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;For the certificate, they are asking you to purchase a certificate for the PA from a recognized CA instead of using the device generated certificate.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/docs/DOC-4232"&gt;How to Generate a CSR(Certificate Signing Request) and Import the Signed Certificate&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For the CVE coverage, you will need to wait for PA to update the PanOS to pass.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Mar 2015 12:14:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pci-vulnerabilities-report/m-p/33355#M24436</guid>
      <dc:creator>pulukas</dc:creator>
      <dc:date>2015-03-27T12:14:44Z</dc:date>
    </item>
    <item>
      <title>Re: PCI Vulnerabilities Report</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pci-vulnerabilities-report/m-p/33356#M24437</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Satish,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The SSLv3 is not disabled for you although you are running 6.1.2?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Mar 2015 14:10:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pci-vulnerabilities-report/m-p/33356#M24437</guid>
      <dc:creator>mmmccorkle</dc:creator>
      <dc:date>2015-03-27T14:10:59Z</dc:date>
    </item>
    <item>
      <title>Re: PCI Vulnerabilities Report</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pci-vulnerabilities-report/m-p/33357#M24438</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi mmm,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After upgrading the PAN OS ssl v3 is disabled but i am facing below issue mention earlier.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Mar 2015 16:19:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pci-vulnerabilities-report/m-p/33357#M24438</guid>
      <dc:creator>Satish</dc:creator>
      <dc:date>2015-03-27T16:19:09Z</dc:date>
    </item>
    <item>
      <title>Re: PCI Vulnerabilities Report</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pci-vulnerabilities-report/m-p/33358#M24439</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Steven for reply let me check.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Mar 2015 16:19:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pci-vulnerabilities-report/m-p/33358#M24439</guid>
      <dc:creator>Satish</dc:creator>
      <dc:date>2015-03-27T16:19:45Z</dc:date>
    </item>
    <item>
      <title>Re: PCI Vulnerabilities Report</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pci-vulnerabilities-report/m-p/33359#M24440</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;how to disable ssl on paloalto for management console permanently and how to enable firewall management console on TSL.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 06 Apr 2015 10:58:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pci-vulnerabilities-report/m-p/33359#M24440</guid>
      <dc:creator>NickySorot</dc:creator>
      <dc:date>2015-04-06T10:58:31Z</dc:date>
    </item>
    <item>
      <title>Re: PCI Vulnerabilities Report</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pci-vulnerabilities-report/m-p/33360#M24441</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;pls help us to close above point. its urgent.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 06 Apr 2015 11:03:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pci-vulnerabilities-report/m-p/33360#M24441</guid>
      <dc:creator>NickySorot</dc:creator>
      <dc:date>2015-04-06T11:03:48Z</dc:date>
    </item>
    <item>
      <title>Re: PCI Vulnerabilities Report</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pci-vulnerabilities-report/m-p/33361#M24442</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Team,&amp;nbsp; pls answer&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 06 Apr 2015 12:24:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pci-vulnerabilities-report/m-p/33361#M24442</guid>
      <dc:creator>NickySorot</dc:creator>
      <dc:date>2015-04-06T12:24:12Z</dc:date>
    </item>
    <item>
      <title>Re: PCI Vulnerabilities Report</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pci-vulnerabilities-report/m-p/33362#M24443</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;OK, I was able to research this further, and &lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; font-size: 13px;"&gt;SSL V3 option has been removed from the PAN OS 6.0.8 and 6.1.2 onward. Prior to these version, you do not have any option to disable SSL V3 on the firewall, rather, you may disable SSL-V3 on your web browser. Accordingly, the client will not send SSL-v3 during the handshake.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please let me know if this answers your question or not.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 06 Apr 2015 19:18:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pci-vulnerabilities-report/m-p/33362#M24443</guid>
      <dc:creator>jdelio</dc:creator>
      <dc:date>2015-04-06T19:18:50Z</dc:date>
    </item>
    <item>
      <title>Re: PCI Vulnerabilities Report</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pci-vulnerabilities-report/m-p/33363#M24444</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;what about TSL?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 07 Apr 2015 11:23:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pci-vulnerabilities-report/m-p/33363#M24444</guid>
      <dc:creator>NickySorot</dc:creator>
      <dc:date>2015-04-07T11:23:37Z</dc:date>
    </item>
    <item>
      <title>Re: PCI Vulnerabilities Report</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pci-vulnerabilities-report/m-p/33364#M24445</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;if we purchase a certificate for the PA from a recognized CA r u sure below issues will b resolved? Pls confirm&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. SSL Certificate - Self-Signed Certificate&amp;nbsp; port 4443/tcp over SSL&lt;/P&gt;&lt;P&gt;2.OpenSSH Local SCP Shell Command Execution Vulnerability (FEDORA-2006-056, Vmware-3069097-Patch,Vmware-9986131-Patch)&lt;/P&gt;&lt;P&gt;3.SSL Certificate - Signature Verification Failed Vulnerability&amp;nbsp;&amp;nbsp; port 443/tcp over SSL&lt;/P&gt;&lt;P&gt;4. SSL Certificate - Self-Signed Certificate&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 08 Apr 2015 06:45:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pci-vulnerabilities-report/m-p/33364#M24445</guid>
      <dc:creator>NickySorot</dc:creator>
      <dc:date>2015-04-08T06:45:05Z</dc:date>
    </item>
    <item>
      <title>Re: PCI Vulnerabilities Report</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pci-vulnerabilities-report/m-p/33365#M24446</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Team pls answer asap&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 08 Apr 2015 09:18:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pci-vulnerabilities-report/m-p/33365#M24446</guid>
      <dc:creator>NickySorot</dc:creator>
      <dc:date>2015-04-08T09:18:27Z</dc:date>
    </item>
    <item>
      <title>Re: PCI Vulnerabilities Report</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pci-vulnerabilities-report/m-p/33366#M24447</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;A purchased certificate from an trusted CA will solve numbers 1, 3, 4.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Number 2 you should as for the CVE number.&amp;nbsp; I assume you are running a PAN appliance.&amp;nbsp; So you would then open a support case and request to know what PanOS version fixes this openSSL CVE.&amp;nbsp; These are only fixed by PanOS upgrades that include the patch for the vulnerability.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Unfortunately, PAN does not make public the PanOS vulnerability database.&amp;nbsp; There are some posts about specific CVE but generally you need to open a case to get an official answer on when the CVE is patched.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 08 Apr 2015 10:06:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pci-vulnerabilities-report/m-p/33366#M24447</guid>
      <dc:creator>pulukas</dc:creator>
      <dc:date>2015-04-08T10:06:33Z</dc:date>
    </item>
    <item>
      <title>Re: PCI Vulnerabilities Report</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pci-vulnerabilities-report/m-p/33367#M24448</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok thanks steven.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1 more question: we have upgraded version 6.1.2 on PA and disable SSLV3 point as per PCI.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But now PCI want to enable PA firewall management console on TSL.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;is this done after disabling SSLV3?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 08 Apr 2015 13:35:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pci-vulnerabilities-report/m-p/33367#M24448</guid>
      <dc:creator>NickySorot</dc:creator>
      <dc:date>2015-04-08T13:35:50Z</dc:date>
    </item>
    <item>
      <title>Re: PCI Vulnerabilities Report</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pci-vulnerabilities-report/m-p/33368#M24449</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I think you are referring to TLS and the POODLE vulnerability.&amp;nbsp; This is patched in versions higher than 6.1.1 and 6.0.8.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://securityadvisories.paloaltonetworks.com/" title="https://securityadvisories.paloaltonetworks.com/"&gt;Palo Alto Networks Product Vulnerability - Security Advisories&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;&lt;A class="cboxElement" href="https://securityadvisories.paloaltonetworks.com/Home/Detail/28"&gt;&lt;IMG alt="Detail" class="jiveImage" src="https://ip1.i.lithium.com/c1ff3f5839d32bb7f44ca0611fdad8a59064e8c0/68747470733a2f2f736563757269747961647669736f726965732e70616c6f616c746f6e6574776f726b732e636f6d2f436f6e74656e742f496d616765732f44657461696c49636f6e2e676966" title="Detail" /&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Padding-oracle attack on TLS CBC cipher mode (CVE-2014-8730)&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt; PAN-SA-2015-0001 &lt;/TD&gt;&lt;TD&gt; Low &lt;/TD&gt;&lt;TD&gt; PAN-OS 6.1.1 and earlier; PAN-OS 6.0.8 and earlier; PAN-OS 5.0.15 and earlier &lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 08 Apr 2015 20:11:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pci-vulnerabilities-report/m-p/33368#M24449</guid>
      <dc:creator>pulukas</dc:creator>
      <dc:date>2015-04-08T20:11:27Z</dc:date>
    </item>
    <item>
      <title>Re: PCI Vulnerabilities Report</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pci-vulnerabilities-report/m-p/67255#M39482</link>
      <description>&lt;P&gt;Dear Team,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;How to close below PCI point. Pls help and suggest.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;OpenSSH Local SCP Shell Command Execution Vulnerability (FEDORA-2006-056, Vmware-3069097-Patch,&lt;BR /&gt;Vmware-9986131-Patch)&lt;/P&gt;</description>
      <pubDate>Mon, 26 Oct 2015 09:56:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pci-vulnerabilities-report/m-p/67255#M39482</guid>
      <dc:creator>NickySorot</dc:creator>
      <dc:date>2015-10-26T09:56:35Z</dc:date>
    </item>
    <item>
      <title>Re: PCI Vulnerabilities Report</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pci-vulnerabilities-report/m-p/67293#M39491</link>
      <description>&lt;P&gt;To reliably find this patch in PanOS you really need to get the CVE number from the scanning company. &amp;nbsp;With this information we can see if it is publicly noted as patched in PanOS. &amp;nbsp;And if not public you can open a ticket and get engineering to determine which version includes the patch.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Steve&lt;/P&gt;</description>
      <pubDate>Mon, 26 Oct 2015 22:28:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pci-vulnerabilities-report/m-p/67293#M39491</guid>
      <dc:creator>pulukas</dc:creator>
      <dc:date>2015-10-26T22:28:09Z</dc:date>
    </item>
  </channel>
</rss>

