<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: openssh vulnerability clarification in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/openssh-vulnerability-clarification/m-p/323166#M82601</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/105432"&gt;@karthikeyanB&lt;/a&gt;&amp;nbsp;,&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/105434"&gt;@Sethupathi&lt;/a&gt;&amp;nbsp;,&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I would agree with BPry.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;That said, you could just telnet to your device on port 22 and it should spit out the OpenSSH version it is using:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;admin$ telnet 10.193.80.80 22
Trying 10.193.80.80...
Connected to 10.193.80.80.
Escape character is '^]'.
SSH-2.0-OpenSSH_12.1&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hope this helps,&lt;/P&gt;
&lt;P&gt;-Kiwi.&lt;/P&gt;</description>
    <pubDate>Thu, 16 Apr 2020 14:03:33 GMT</pubDate>
    <dc:creator>kiwi</dc:creator>
    <dc:date>2020-04-16T14:03:33Z</dc:date>
    <item>
      <title>openssh vulnerability clarification</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/openssh-vulnerability-clarification/m-p/323102#M82576</link>
      <description>&lt;P&gt;Team,&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Below Advisory mentioned that openssh 7.9 is affected with few vulnerabilities&amp;nbsp; and on upgrade to 8.1.13 will resolve it.&lt;BR /&gt;&lt;A href="https://security.paloaltonetworks.com/PAN-SA-2020-0002" target="_blank"&gt;https://security.paloaltonetworks.com/PAN-SA-2020-0002&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;but below pan os open source listing mentioned as openssh version is 6.4 is used.&amp;nbsp; So can you please confirm whether update is required and whether update to 8.1.13 will resolve the issue???&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/oss-listings/pan-os-oss-listings/pan-os-8-1-open-source-software-oss-listing.html" target="_blank"&gt;https://docs.paloaltonetworks.com/oss-listings/pan-os-oss-listings/pan-os-8-1-open-source-software-oss-listing.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Or whether Openssh version identification method is incorrect??&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Warm Regards,&lt;/P&gt;&lt;P&gt;Karthikeyan Balamurugan&lt;/P&gt;</description>
      <pubDate>Thu, 16 Apr 2020 09:02:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/openssh-vulnerability-clarification/m-p/323102#M82576</guid>
      <dc:creator>karthikeyanB</dc:creator>
      <dc:date>2020-04-16T09:02:01Z</dc:date>
    </item>
    <item>
      <title>Re: openssh vulnerability clarification</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/openssh-vulnerability-clarification/m-p/323152#M82593</link>
      <description>Hi Team, Could you please help us here. !</description>
      <pubDate>Thu, 16 Apr 2020 12:53:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/openssh-vulnerability-clarification/m-p/323152#M82593</guid>
      <dc:creator>Sethupathi</dc:creator>
      <dc:date>2020-04-16T12:53:50Z</dc:date>
    </item>
    <item>
      <title>Re: openssh vulnerability clarification</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/openssh-vulnerability-clarification/m-p/323160#M82598</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/105432"&gt;@karthikeyanB&lt;/a&gt;&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/105434"&gt;@Sethupathi&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;You'll probably get a better response for something this specific by opening a support case. My first thought would be that they aren't actually updating the OSS listings for each major release outside of initial release; so as the maintenance releases upgrade packages they aren't reflected in the OSS listing.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 16 Apr 2020 13:57:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/openssh-vulnerability-clarification/m-p/323160#M82598</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2020-04-16T13:57:04Z</dc:date>
    </item>
    <item>
      <title>Re: openssh vulnerability clarification</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/openssh-vulnerability-clarification/m-p/323166#M82601</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/105432"&gt;@karthikeyanB&lt;/a&gt;&amp;nbsp;,&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/105434"&gt;@Sethupathi&lt;/a&gt;&amp;nbsp;,&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I would agree with BPry.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;That said, you could just telnet to your device on port 22 and it should spit out the OpenSSH version it is using:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;admin$ telnet 10.193.80.80 22
Trying 10.193.80.80...
Connected to 10.193.80.80.
Escape character is '^]'.
SSH-2.0-OpenSSH_12.1&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hope this helps,&lt;/P&gt;
&lt;P&gt;-Kiwi.&lt;/P&gt;</description>
      <pubDate>Thu, 16 Apr 2020 14:03:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/openssh-vulnerability-clarification/m-p/323166#M82601</guid>
      <dc:creator>kiwi</dc:creator>
      <dc:date>2020-04-16T14:03:33Z</dc:date>
    </item>
    <item>
      <title>Re: openssh vulnerability clarification</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/openssh-vulnerability-clarification/m-p/587686#M117237</link>
      <description>&lt;P&gt;I ended up having to do some research to find out why a vulnerability was flagging on a newer version of PAN-OS. 10.1 reports a correct version of&amp;nbsp;SSH-2.0-OpenSSH_7.7 but an older PAN-OS of 8.1 reports an OpenSSH version that doesn't exist, the one you posted above,&amp;nbsp;SSH-2.0-OpenSSH_12.1. This is not a valid OpenSSH version. The latest version 4 years later is 9.7. I can't find any resource online indicating why PAN would be misreporting the version.&lt;/P&gt;</description>
      <pubDate>Wed, 22 May 2024 18:06:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/openssh-vulnerability-clarification/m-p/587686#M117237</guid>
      <dc:creator>Michael.Gossett</dc:creator>
      <dc:date>2024-05-22T18:06:43Z</dc:date>
    </item>
  </channel>
</rss>

