- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
Enhanced Security Measures in Place: To ensure a safer experience, we’ve implemented additional, temporary security measures for all users.
05-27-2021 09:04 AM
Hi Team,
Current PAN OS -8.1.10
Customer had run a VAPT assesment where they came up with certain Vulnerability such as
90317 - SSH Weak Algorithms Supported
70658 - SSH Server CBC Mode Ciphers Enabled
71049 - SSH Weak MAC Algorithms Enabled
While checking certain things are not there from the firewall end but while checking using their Vulnerability Assessment tool they are having these mentioned output as above mentioned vulnerability.
Below is the firewall Output
Firewall output:
# show deviceconfig system ssh ciphers mgmt
aes128-ctr;
aes128-gcm;
aes192-ctr;
aes256-ctr;
aes256-gcm;
# show deviceconfig system ssh mac mgmt
{
hmac-sha2-256;
hmac-sha2-512;
}
Are the above mentioned Vulnerability is addressed in any other PAN OS version?
06-01-2021 11:36 AM
Hello,
Check out these posts/articles.
https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000CmqeCAC
Regards,
06-17-2021 05:04 AM - edited 06-21-2021 09:22 PM
Step 1: Conduct Risk Identification And Analysis.
Step 2: Vulnerability Scanning Policies and Procedures.
Step 3: Identify The Types Of Vulnerability mylonestar Scans.
Step 4: Configure The Scan.
Step 5: Perform The Scan.
Step 6: Evaluate And Consider Possible Risks.
Step 7: Interpret The Scan Results.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!