openSSH version 9.8 or later in PAN-OS

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 

openSSH version 9.8 or later in PAN-OS

L2 Linker

Hi Guys,

Hope you are all doing well.

Just wanted to confirm which PAN-OS currently has an openSSH 9.8 version or later? 

Following this kb article: How to check the OpenSSH version the PAN-OS device is using - Knowledge Base - Palo Alto Networks

I did try to check it on Palo Alto networks OSS Licenses, however seems like the most updated PAN-OS that is listed there is only 11.0 and the openSSH version for that is only 8.0
PAN-OS 11.0 OSS Listing

my current version is on 10.2.x and planning to upgrade it as recommended on the VAPT assessment to upgrade the openSSH into 9.8version or later.

PA model: PA-820

Thanks


1 accepted solution

Accepted Solutions

Cyber Elite
Cyber Elite

Hi @IMTechSupport ,

 

I sent an email to psirt@paloaltonetworks.com and I got the following response:

 

PAN-OS runs a custom build of OpenSSH, so the version number does not necessarily correspond with applicable OpenSSH CVEs. This OpenSSH build receives regular security updates.  You may find some information about the reported CVEs in our informational advisories. You can try the query feature of the security advisories site: https://security.paloaltonetworks.com/?q=<CVE> (replace <CVE> with the id of the CVE you are looking for, for eg: https://security.paloaltonetworks.com/?q=CVE-2024-1234).  If there are any CVEs you are concerned about that is not mentioned in the advisories, please let us know - so that we can investigate further.

 

That was very helpful!  So, I took the list of OpenSSH 8.0p1 CVEs (in my 1st thread) and search for each one in the tool provided above.  Here are the results:

 

OpenSSH 8.0p1 Advisory Severity CVEs CWEs PANW Advisory Impact
Multiple vulnerabilities in OpenSSH Medium CVE-2023-6004 CWE-78    
    CVE-2023-48795 CWE-326 https://security.paloaltonetworks.com/CVE-2023-48795 Fixed in multiple versions
    CVE-2023-51384, CVE-2023-51385   https://security.paloaltonetworks.com/PAN-SA-2024-0001 Not affected
Remote code execution in OpenSSH ssh-agent Medium CVE-2023-38408 CWE-426 https://security.paloaltonetworks.com/PAN-SA-2024-0001 Not affected
Multiple vulnerabilities in OpenSSH Low N/A CWE-119, CWE-415    
Amazon Linux AMI update for openssh, Privilege escalation in OpenSSH Low CVE-2021-41617 CWE-269 https://security.paloaltonetworks.com/CVE-2021-41617 Not affected
MitM attack in OpenSSH client Medium CVE-2020-14145 CWE-327 https://security.paloaltonetworks.com/PAN-SA-2024-0004 Fixed in 10.2.3 and above
Security restrictions bypass in OpenSSH Low N/A CWE-399    
Privilege escalation in OpenSSH Low CVE-2019-16905 CWE-190 https://security.paloaltonetworks.com/PAN-SA-2024-0001 Not affected

 

So, everything is fixed in the current OpenSSH version of PAN-OS, except we have no information about 1 CVE and 3 CWEs.  If you must have confirmation about the undocumented vulnerabilities, you can email the PANW PSIRT team about those specifically.

 

Thanks,

 

Tom

Help the community: Like helpful comments and mark solutions.

View solution in original post

2 REPLIES 2

Cyber Elite
Cyber Elite

Hi @IMTechSupport ,

 

I recently had a VAPT (internal) like you, and ran across the same issue.  There appears to be quite a few vulnerabilities with the current version of OpenSSH in PAN-OS.  https://www.cybersecurity-help.cz/vdb/openssh/openssh/8.0p1/

 

I would like PANW to update the URL you provided to add PAN-OS 11.1 and 11.2.

 

This thread was also useful https://live.paloaltonetworks.com/t5/next-generation-firewall/openssh-verification-and-upgrade/td-p/... because it provides (1) and easy test and (2) the PANW PSIRT email to which you can ask them about the vulnerabilities.

 

Thanks,

 

Tom

Help the community: Like helpful comments and mark solutions.

Cyber Elite
Cyber Elite

Hi @IMTechSupport ,

 

I sent an email to psirt@paloaltonetworks.com and I got the following response:

 

PAN-OS runs a custom build of OpenSSH, so the version number does not necessarily correspond with applicable OpenSSH CVEs. This OpenSSH build receives regular security updates.  You may find some information about the reported CVEs in our informational advisories. You can try the query feature of the security advisories site: https://security.paloaltonetworks.com/?q=<CVE> (replace <CVE> with the id of the CVE you are looking for, for eg: https://security.paloaltonetworks.com/?q=CVE-2024-1234).  If there are any CVEs you are concerned about that is not mentioned in the advisories, please let us know - so that we can investigate further.

 

That was very helpful!  So, I took the list of OpenSSH 8.0p1 CVEs (in my 1st thread) and search for each one in the tool provided above.  Here are the results:

 

OpenSSH 8.0p1 Advisory Severity CVEs CWEs PANW Advisory Impact
Multiple vulnerabilities in OpenSSH Medium CVE-2023-6004 CWE-78    
    CVE-2023-48795 CWE-326 https://security.paloaltonetworks.com/CVE-2023-48795 Fixed in multiple versions
    CVE-2023-51384, CVE-2023-51385   https://security.paloaltonetworks.com/PAN-SA-2024-0001 Not affected
Remote code execution in OpenSSH ssh-agent Medium CVE-2023-38408 CWE-426 https://security.paloaltonetworks.com/PAN-SA-2024-0001 Not affected
Multiple vulnerabilities in OpenSSH Low N/A CWE-119, CWE-415    
Amazon Linux AMI update for openssh, Privilege escalation in OpenSSH Low CVE-2021-41617 CWE-269 https://security.paloaltonetworks.com/CVE-2021-41617 Not affected
MitM attack in OpenSSH client Medium CVE-2020-14145 CWE-327 https://security.paloaltonetworks.com/PAN-SA-2024-0004 Fixed in 10.2.3 and above
Security restrictions bypass in OpenSSH Low N/A CWE-399    
Privilege escalation in OpenSSH Low CVE-2019-16905 CWE-190 https://security.paloaltonetworks.com/PAN-SA-2024-0001 Not affected

 

So, everything is fixed in the current OpenSSH version of PAN-OS, except we have no information about 1 CVE and 3 CWEs.  If you must have confirmation about the undocumented vulnerabilities, you can email the PANW PSIRT team about those specifically.

 

Thanks,

 

Tom

Help the community: Like helpful comments and mark solutions.
  • 1 accepted solution
  • 379 Views
  • 2 replies
  • 0 Likes
Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!