<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Palo Alto SSH Vulnerabilities in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-ssh-vulnerabilities/m-p/422817#M94095</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;Running a newer recommended release are not affected by the vulnerabilities listed.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://security.paloaltonetworks.com/" target="_blank"&gt;https://security.paloaltonetworks.com/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/customer-resources/support-pan-os-software-release-guidance/ta-p/258304" target="_blank"&gt;https://live.paloaltonetworks.com/t5/customer-resources/support-pan-os-software-release-guidance/ta-p/258304&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;</description>
    <pubDate>Wed, 28 Jul 2021 22:01:16 GMT</pubDate>
    <dc:creator>OtakarKlier</dc:creator>
    <dc:date>2021-07-28T22:01:16Z</dc:date>
    <item>
      <title>Palo Alto SSH Vulnerabilities</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-ssh-vulnerabilities/m-p/277006#M75404</link>
      <description>&lt;P&gt;Hi Team,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We are finding the below vulnerabilities being detected on Palo Alto Management SSH service :&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;&lt;U&gt;&lt;A href="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2007-2768" target="_blank" rel="noopener"&gt;CVE-2007-2768&lt;/A&gt;&lt;/U&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;&lt;U&gt;&lt;A href="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2004-1653" target="_blank" rel="noopener"&gt;CVE-2004-1653&lt;/A&gt;&lt;/U&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;&lt;U&gt;&lt;A href="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2007-2243" target="_blank" rel="noopener"&gt;CVE-2007-2243&lt;/A&gt;&lt;/U&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;&lt;U&gt;&lt;A href="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-2183" target="_blank" rel="noopener"&gt;CVE-2016-2183&lt;/A&gt;&lt;/U&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;Kindly help us in resolving the above said vulnerabilities.&amp;nbsp; Devices are running with the OS 8.0.16.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Sethupathi M&lt;/P&gt;</description>
      <pubDate>Wed, 17 Jul 2019 12:00:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-ssh-vulnerabilities/m-p/277006#M75404</guid>
      <dc:creator>Sethupathi</dc:creator>
      <dc:date>2019-07-17T12:00:49Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto SSH Vulnerabilities</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-ssh-vulnerabilities/m-p/277044#M75408</link>
      <description>it's recommended to set the management interface on a private network and add only a few allowed IP addresses to access management, to limit the attack surface of any potential bad actor

some of these are for pretty old openssh version, may want to check with TAC if your scan is accurate</description>
      <pubDate>Wed, 17 Jul 2019 14:07:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-ssh-vulnerabilities/m-p/277044#M75408</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2019-07-17T14:07:04Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto SSH Vulnerabilities</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-ssh-vulnerabilities/m-p/422721#M94087</link>
      <description>&lt;PRE&gt;&lt;SPAN class="Y2IQFc"&gt;Hello, is it possible to indicate if there is any mitigation or the new versions of pan os, are they not affected by these vulnerabilities, regardless of the administrative restrictions?&lt;/SPAN&gt;&lt;/PRE&gt;</description>
      <pubDate>Wed, 28 Jul 2021 17:01:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-ssh-vulnerabilities/m-p/422721#M94087</guid>
      <dc:creator>jmsepulveda</dc:creator>
      <dc:date>2021-07-28T17:01:02Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto SSH Vulnerabilities</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-ssh-vulnerabilities/m-p/422817#M94095</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;Running a newer recommended release are not affected by the vulnerabilities listed.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://security.paloaltonetworks.com/" target="_blank"&gt;https://security.paloaltonetworks.com/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/customer-resources/support-pan-os-software-release-guidance/ta-p/258304" target="_blank"&gt;https://live.paloaltonetworks.com/t5/customer-resources/support-pan-os-software-release-guidance/ta-p/258304&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Wed, 28 Jul 2021 22:01:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-ssh-vulnerabilities/m-p/422817#M94095</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2021-07-28T22:01:16Z</dc:date>
    </item>
  </channel>
</rss>

