<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Question About PA SSL vulnerability in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/question-about-pa-ssl-vulnerability/m-p/271321#M74813</link>
    <description>&lt;P&gt;Hello Team,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Can anyone provide a solution&amp;nbsp;&lt;/SPAN&gt;resolve below vulnerability in PA.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Port no.:&lt;/STRONG&gt;&amp;nbsp;443&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Summary:&lt;/STRONG&gt;&amp;nbsp;Weak cipher suites supported&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Analysis :&lt;/STRONG&gt;The remote host running SSL using a weak cipher suite which can be exploited by an attacker to perform man in the middle attacks. All the updated and secured services will be transmitting data over the unencrypted channel.&lt;/P&gt;&lt;P&gt;Attacker can obtain the keys with factorization in short amount of time. Also vulnerable to various cryptographic flaws like POODLE attack or MITM attack.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Recommendations:&lt;/STRONG&gt;&amp;nbsp;Remove the weak or guessable cipher suites&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Could you please help us here to fix an issue.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Note: PAN-OS 8.0. Platform&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Sethupathi M&lt;/P&gt;</description>
    <pubDate>Wed, 19 Jun 2019 13:40:06 GMT</pubDate>
    <dc:creator>Sethupathi</dc:creator>
    <dc:date>2019-06-19T13:40:06Z</dc:date>
    <item>
      <title>Question About PA SSL vulnerability</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/question-about-pa-ssl-vulnerability/m-p/271321#M74813</link>
      <description>&lt;P&gt;Hello Team,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Can anyone provide a solution&amp;nbsp;&lt;/SPAN&gt;resolve below vulnerability in PA.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Port no.:&lt;/STRONG&gt;&amp;nbsp;443&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Summary:&lt;/STRONG&gt;&amp;nbsp;Weak cipher suites supported&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Analysis :&lt;/STRONG&gt;The remote host running SSL using a weak cipher suite which can be exploited by an attacker to perform man in the middle attacks. All the updated and secured services will be transmitting data over the unencrypted channel.&lt;/P&gt;&lt;P&gt;Attacker can obtain the keys with factorization in short amount of time. Also vulnerable to various cryptographic flaws like POODLE attack or MITM attack.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Recommendations:&lt;/STRONG&gt;&amp;nbsp;Remove the weak or guessable cipher suites&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Could you please help us here to fix an issue.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Note: PAN-OS 8.0. Platform&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Sethupathi M&lt;/P&gt;</description>
      <pubDate>Wed, 19 Jun 2019 13:40:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/question-about-pa-ssl-vulnerability/m-p/271321#M74813</guid>
      <dc:creator>Sethupathi</dc:creator>
      <dc:date>2019-06-19T13:40:06Z</dc:date>
    </item>
    <item>
      <title>Re: Question About PA SSL vulnerability</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/question-about-pa-ssl-vulnerability/m-p/271435#M74823</link>
      <description>&lt;P&gt;Is this when accessing the web UI for managing the firewall?&amp;nbsp; If so, it's an easy fix:&lt;/P&gt;&lt;P&gt;&amp;nbsp; - Device tab --&amp;gt; Certificate Management --&amp;gt; SSL/TLS Service Profile&lt;/P&gt;&lt;P&gt;&amp;nbsp; - click on the profile that you use for the web interface (as specified under Device tab --&amp;gt; Setup --&amp;gt; Management sub-tab)&lt;/P&gt;&lt;P&gt;&amp;nbsp; - change the Min Version to TLSv1.2&lt;/P&gt;&lt;P&gt;&amp;nbsp; - click OK&lt;/P&gt;&lt;P&gt;&amp;nbsp; - commit the change&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Run the vulnerability scanner again, and it shouldn't show up anymore.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If this is for something else, you'll need to provide more details.&lt;/P&gt;</description>
      <pubDate>Wed, 19 Jun 2019 17:14:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/question-about-pa-ssl-vulnerability/m-p/271435#M74823</guid>
      <dc:creator>fjwcash</dc:creator>
      <dc:date>2019-06-19T17:14:11Z</dc:date>
    </item>
  </channel>
</rss>

