- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
Enhanced Security Measures in Place: To ensure a safer experience, we’ve implemented additional, temporary security measures for all users.
01-30-2024 07:34 AM
Hi Team,
We have to 2 Paloalto VM firewall running active-passive mode in AWS.
As a part of internal Pentest we go the below findings for the Active and passive firewall nodes. The result refers to SSL and TLS vulnerabilities.
Could you please suggest on how to mitigate this.
01-31-2024 12:32 PM
What is the specific vulnerability that is being flagged? My first thought is that you dont have a SSL/TLS Service profile attached to the managment interface or enforcing a minimum of tls 1.2.
Add a certificate to a SSL/TLS Service profile and enforcing tls v1.2: Configure an SSL/TLS Service Profile (paloaltonetworks.com)
Adding that SSL/TLS service profile to the management interface: Device > Setup > Management (paloaltonetworks.com)
02-08-2024 07:39 AM
Hi,
These are the Vuln that are being flagged ==-> 1. 38913 SSH Prefix Truncation Vulnerability (Terrapin)
2. 38909 SHA1 deprecated setting for SSH
02-08-2024 07:50 AM
Gotcha, then in that case I believe you are needed to create an SSH service profile and attach it. Depending on what you're all needing to be removed you may also need to follow the KB article attached.
Configure an SSH Service Profile (paloaltonetworks.com)
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!