Palo Alto SSH Vulnerabilities

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Announcements
Please sign in to see details of an important advisory in our Customer Advisories area.

Palo Alto SSH Vulnerabilities

L3 Networker

Hi Team,

 

We are finding the below vulnerabilities being detected on Palo Alto Management SSH service :

 

 

CVE-2007-2768

CVE-2004-1653

CVE-2007-2243

CVE-2016-2183

 

Kindly help us in resolving the above said vulnerabilities.  Devices are running with the OS 8.0.16.

 

Regards,

Sethupathi M

3 REPLIES 3

Cyber Elite
Cyber Elite
it's recommended to set the management interface on a private network and add only a few allowed IP addresses to access management, to limit the attack surface of any potential bad actor some of these are for pretty old openssh version, may want to check with TAC if your scan is accurate
Tom Piens
PANgurus - Strata specialist; config reviews, policy optimization

L1 Bithead
Hello, is it possible to indicate if there is any mitigation or the new versions of pan os, are they not affected by these vulnerabilities, regardless of the administrative restrictions?

Cyber Elite
Cyber Elite

Hello,

Running a newer recommended release are not affected by the vulnerabilities listed.

 

https://security.paloaltonetworks.com/

 

https://live.paloaltonetworks.com/t5/customer-resources/support-pan-os-software-release-guidance/ta-...

 

Regards,

  • 4209 Views
  • 3 replies
  • 1 Likes
Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!