<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Palo Alto Vulnerability Points (Urgent Action Required) in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-vulnerability-points-urgent-action-required/m-p/269100#M74589</link>
    <description>&lt;P&gt;Hi Team,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can anyone provide your valuable suggestion here please.&lt;/P&gt;&lt;P&gt;Below are the VAPT points shared by customer and solution provided :&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;PA Vulnerability points (For reference please find attached pdf) :&lt;BR /&gt;1) ssl/tls protocol initialization vector implementation information disclosure vulnerability (BEAST) - SSL/tls profile needs to be configure for firewall mgmt access. SSL/TLS version we can keep from TLS1.1 to TLS 1.2&lt;BR /&gt;2) ssl/tls protocol initialization vector implementation information disclosure vulnerability (BEAST) - SSL/tls profile needs to be configure for firewall mgmt access. SSL/TLS version we can keep from TLS1.1 to TLS 1.2&lt;BR /&gt;3) SSL self-signed certificate - Purchase a certificate&lt;BR /&gt;4) ssl certificate cannot be trusted - Purchase a certificate&lt;BR /&gt;5) ssl certificate cannot be trusted - Purchase a certificate&lt;BR /&gt;6) SSL medium strength cipher suites supported(sweet32) - ECDSA certificate configure in Firewall&lt;BR /&gt;7) SSL certificate siged using weak hashing algorithm - ECDSA certificate configure in Firewall&lt;BR /&gt;&lt;span class="lia-unicode-emoji" title=":smiling_face_with_sunglasses:"&gt;😎&lt;/span&gt; SSH weak algorithm supported - enable only GCM and CTR ciphers , only applicable above 8.0 version&lt;BR /&gt;&lt;STRONG&gt;9) HSTS missing from HTTPS server - Need to check with tac&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;10) HSTS missing from HTTPS server - Need to check with tac&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;11) HTTP Methos allowed (per directory) - Need to check with tac&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;12) HTTP Methos allowed (per directory) - Need to check with tac&lt;/STRONG&gt;&lt;BR /&gt;13) SSH server CBC mode ciphers enabled - enable only GCM and CTR ciphers , only applicable above 8.0 version&lt;BR /&gt;14) SSH weak mac algorithm enabled - we can disable ssh weak mac algorithm , only applicable above 8.0 version&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please correct if anything wrong.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Software Version 7.1.21&lt;BR /&gt;Model PA-500&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please help us here to provide solution of following questions if anyone knows,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#003300"&gt;&lt;EM&gt;&lt;STRONG&gt;9) HSTS missing from HTTPS server - ?&lt;/STRONG&gt;&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#003300"&gt;&lt;EM&gt;&lt;STRONG&gt;10) HSTS missing from HTTPS server - ?&lt;/STRONG&gt;&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#003300"&gt;&lt;EM&gt;&lt;STRONG&gt;11) HTTP Methos allowed (per directory) - ?&lt;/STRONG&gt;&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#003300"&gt;&lt;EM&gt;&lt;STRONG&gt;12) HTTP Methos allowed (per directory) - ?&lt;/STRONG&gt;&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Sethupathi M&lt;/P&gt;</description>
    <pubDate>Wed, 12 Jun 2019 09:50:51 GMT</pubDate>
    <dc:creator>Sethupathi</dc:creator>
    <dc:date>2019-06-12T09:50:51Z</dc:date>
    <item>
      <title>Palo Alto Vulnerability Points (Urgent Action Required)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-vulnerability-points-urgent-action-required/m-p/269100#M74589</link>
      <description>&lt;P&gt;Hi Team,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can anyone provide your valuable suggestion here please.&lt;/P&gt;&lt;P&gt;Below are the VAPT points shared by customer and solution provided :&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;PA Vulnerability points (For reference please find attached pdf) :&lt;BR /&gt;1) ssl/tls protocol initialization vector implementation information disclosure vulnerability (BEAST) - SSL/tls profile needs to be configure for firewall mgmt access. SSL/TLS version we can keep from TLS1.1 to TLS 1.2&lt;BR /&gt;2) ssl/tls protocol initialization vector implementation information disclosure vulnerability (BEAST) - SSL/tls profile needs to be configure for firewall mgmt access. SSL/TLS version we can keep from TLS1.1 to TLS 1.2&lt;BR /&gt;3) SSL self-signed certificate - Purchase a certificate&lt;BR /&gt;4) ssl certificate cannot be trusted - Purchase a certificate&lt;BR /&gt;5) ssl certificate cannot be trusted - Purchase a certificate&lt;BR /&gt;6) SSL medium strength cipher suites supported(sweet32) - ECDSA certificate configure in Firewall&lt;BR /&gt;7) SSL certificate siged using weak hashing algorithm - ECDSA certificate configure in Firewall&lt;BR /&gt;&lt;span class="lia-unicode-emoji" title=":smiling_face_with_sunglasses:"&gt;😎&lt;/span&gt; SSH weak algorithm supported - enable only GCM and CTR ciphers , only applicable above 8.0 version&lt;BR /&gt;&lt;STRONG&gt;9) HSTS missing from HTTPS server - Need to check with tac&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;10) HSTS missing from HTTPS server - Need to check with tac&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;11) HTTP Methos allowed (per directory) - Need to check with tac&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;12) HTTP Methos allowed (per directory) - Need to check with tac&lt;/STRONG&gt;&lt;BR /&gt;13) SSH server CBC mode ciphers enabled - enable only GCM and CTR ciphers , only applicable above 8.0 version&lt;BR /&gt;14) SSH weak mac algorithm enabled - we can disable ssh weak mac algorithm , only applicable above 8.0 version&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please correct if anything wrong.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Software Version 7.1.21&lt;BR /&gt;Model PA-500&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please help us here to provide solution of following questions if anyone knows,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#003300"&gt;&lt;EM&gt;&lt;STRONG&gt;9) HSTS missing from HTTPS server - ?&lt;/STRONG&gt;&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#003300"&gt;&lt;EM&gt;&lt;STRONG&gt;10) HSTS missing from HTTPS server - ?&lt;/STRONG&gt;&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#003300"&gt;&lt;EM&gt;&lt;STRONG&gt;11) HTTP Methos allowed (per directory) - ?&lt;/STRONG&gt;&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#003300"&gt;&lt;EM&gt;&lt;STRONG&gt;12) HTTP Methos allowed (per directory) - ?&lt;/STRONG&gt;&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Sethupathi M&lt;/P&gt;</description>
      <pubDate>Wed, 12 Jun 2019 09:50:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-vulnerability-points-urgent-action-required/m-p/269100#M74589</guid>
      <dc:creator>Sethupathi</dc:creator>
      <dc:date>2019-06-12T09:50:51Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto Vulnerability Points (Urgent Action Required)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-vulnerability-points-urgent-action-required/m-p/269319#M74607</link>
      <description>thats 2x the same question ? could you add some more details?

If something is missing from the server, you'll want to check the server, same for the http methods allowed per directory</description>
      <pubDate>Wed, 12 Jun 2019 18:34:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-vulnerability-points-urgent-action-required/m-p/269319#M74607</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2019-06-12T18:34:26Z</dc:date>
    </item>
  </channel>
</rss>

