<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Vulnerability Mitigation for TLS 1.0 and Weak Ciphers in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Vulnerability-Mitigation-for-TLS-1-0-and-Weak-Ciphers/m-p/56960#M27449</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I need&amp;nbsp; instructions to mitigate the following two vulnerabilities from our Gateways :&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;1) Enable Support for TLS 1.1 and TLS 1.2 , and disable TLS&amp;nbsp; 1.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;2) Removal of Weak Ciphers&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;We are using a VSX Cluster environment with R80.10&lt;/P&gt;&lt;P&gt;Also, what could be the after effects after removing these vulnerabilities on the existing production environment.&lt;/P&gt;&lt;P&gt;Please suggest.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
    <pubDate>Fri, 28 Jun 2019 14:49:36 GMT</pubDate>
    <dc:creator>LostBoY</dc:creator>
    <dc:date>2019-06-28T14:49:36Z</dc:date>
    <item>
      <title>Vulnerability Mitigation for TLS 1.0 and Weak Ciphers</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Vulnerability-Mitigation-for-TLS-1-0-and-Weak-Ciphers/m-p/56960#M27449</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I need&amp;nbsp; instructions to mitigate the following two vulnerabilities from our Gateways :&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;1) Enable Support for TLS 1.1 and TLS 1.2 , and disable TLS&amp;nbsp; 1.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;2) Removal of Weak Ciphers&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;We are using a VSX Cluster environment with R80.10&lt;/P&gt;&lt;P&gt;Also, what could be the after effects after removing these vulnerabilities on the existing production environment.&lt;/P&gt;&lt;P&gt;Please suggest.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Fri, 28 Jun 2019 14:49:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Vulnerability-Mitigation-for-TLS-1-0-and-Weak-Ciphers/m-p/56960#M27449</guid>
      <dc:creator>LostBoY</dc:creator>
      <dc:date>2019-06-28T14:49:36Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability Mitigation for TLS 1.0 and Weak Ciphers</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Vulnerability-Mitigation-for-TLS-1-0-and-Weak-Ciphers/m-p/56982#M27450</link>
      <description>As there isn't one global "use TLSv1.2" and "disable weak ciphers" setting, we need some more context, namely on what ports these issues were found.&lt;BR /&gt;The main one the comes up (Gaia WEBUI) isn't relevant on VSX.</description>
      <pubDate>Fri, 28 Jun 2019 19:12:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Vulnerability-Mitigation-for-TLS-1-0-and-Weak-Ciphers/m-p/56982#M27450</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-06-28T19:12:53Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability Mitigation for TLS 1.0 and Weak Ciphers</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Vulnerability-Mitigation-for-TLS-1-0-and-Weak-Ciphers/m-p/59330#M27451</link>
      <description>thanks for the reply.. vulnerability has been reported on port 443 (TLS 1.0 Protocol Detection) ...discovered on 2 VSX Gateways which are in cluster</description>
      <pubDate>Wed, 31 Jul 2019 10:12:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Vulnerability-Mitigation-for-TLS-1-0-and-Weak-Ciphers/m-p/59330#M27451</guid>
      <dc:creator>LostBoY</dc:creator>
      <dc:date>2019-07-31T10:12:53Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability Mitigation for TLS 1.0 and Weak Ciphers</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Vulnerability-Mitigation-for-TLS-1-0-and-Weak-Ciphers/m-p/59500#M27452</link>
      <description>What blades are active on this gateway?&lt;BR /&gt;Like I said, the main culprit (the Gaia WebUI) is not active on VSX.</description>
      <pubDate>Fri, 02 Aug 2019 14:15:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Vulnerability-Mitigation-for-TLS-1-0-and-Weak-Ciphers/m-p/59500#M27452</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-08-02T14:15:39Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability Mitigation for TLS 1.0 and Weak Ciphers</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Vulnerability-Mitigation-for-TLS-1-0-and-Weak-Ciphers/m-p/62367#M27453</link>
      <description>AntiBot, Antivirus, IPS</description>
      <pubDate>Tue, 10 Sep 2019 09:44:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Vulnerability-Mitigation-for-TLS-1-0-and-Weak-Ciphers/m-p/62367#M27453</guid>
      <dc:creator>LostBoY</dc:creator>
      <dc:date>2019-09-10T09:44:19Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability Mitigation for TLS 1.0 and Weak Ciphers</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Vulnerability-Mitigation-for-TLS-1-0-and-Weak-Ciphers/m-p/62374#M27454</link>
      <description>&lt;P&gt;Maybe also SSL Inspection ? Then see&amp;nbsp;&lt;A class="cp_link sc_ellipsis" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk126613&amp;amp;partition=Advanced&amp;amp;product=Security" target="_blank"&gt;sk126613: &lt;STRONG&gt;Cipher&lt;/STRONG&gt;configuration tool for R80.x Gateways.&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 10 Sep 2019 10:54:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Vulnerability-Mitigation-for-TLS-1-0-and-Weak-Ciphers/m-p/62374#M27454</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2019-09-10T10:54:49Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability Mitigation for TLS 1.0 and Weak Ciphers</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Vulnerability-Mitigation-for-TLS-1-0-and-Weak-Ciphers/m-p/72450#M27455</link>
      <description>&lt;P&gt;how to remediate TLS vulnerability on checkpoint firewall Virtual interface&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;and&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk126613&amp;amp;partition=Advanced&amp;amp;product=Security" target="_blank" rel="nofollow noopener noreferrer"&gt;sk126613:&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Cipher&lt;/STRONG&gt;configuration tool for R80.x Gateways.&lt;/A&gt;&amp;nbsp; is not clearing this requirement @&lt;/P&gt;&lt;DIV class="lia-message-author-with-avatar"&gt;&lt;SPAN class="UserName lia-user-name lia-user-rank-Ruby lia-component-message-view-widget-author-username"&gt;&lt;A href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/21294" target="_self"&gt;&lt;SPAN class=""&gt;G_W_Albrecht&lt;/SPAN&gt;&lt;/A&gt;&lt;/SPAN&gt;&lt;/DIV&gt;</description>
      <pubDate>Thu, 16 Jan 2020 17:08:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Vulnerability-Mitigation-for-TLS-1-0-and-Weak-Ciphers/m-p/72450#M27455</guid>
      <dc:creator>Parmod</dc:creator>
      <dc:date>2020-01-16T17:08:24Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability Mitigation for TLS 1.0 and Weak Ciphers</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Vulnerability-Mitigation-for-TLS-1-0-and-Weak-Ciphers/m-p/74983#M27456</link>
      <description>&lt;P&gt;&lt;STRONG&gt;1) Enable Support for TLS 1.1 and TLS 1.2 , and disable TLS&amp;nbsp; 1.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="2"&gt;&lt;U&gt;Note&lt;/U&gt;: I am a novice user, so please check in test setup before applying to production.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;Solution: In &lt;STRONG&gt;&lt;EM&gt;Smart console menu-&amp;gt;Global properties-&amp;gt;Advanced-&amp;gt;Configure...&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Go to &lt;EM&gt;&lt;STRONG&gt;portal properties&lt;/STRONG&gt;&lt;/EM&gt;, there it will show option to set max and min ssl version attributes.&lt;/P&gt;&lt;P&gt;There you may change &lt;EM&gt;&lt;STRONG&gt;ssl min. version&lt;/STRONG&gt;&lt;/EM&gt; from TLS1.0 to TLS1.1.&lt;/P&gt;</description>
      <pubDate>Wed, 12 Feb 2020 13:42:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Vulnerability-Mitigation-for-TLS-1-0-and-Weak-Ciphers/m-p/74983#M27456</guid>
      <dc:creator>sushilsharma</dc:creator>
      <dc:date>2020-02-12T13:42:37Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability Mitigation for TLS 1.0 and Weak Ciphers</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Vulnerability-Mitigation-for-TLS-1-0-and-Weak-Ciphers/m-p/94894#M27457</link>
      <description>&lt;P&gt;awesome, thanks&amp;nbsp; for sharing&lt;/P&gt;</description>
      <pubDate>Fri, 21 Aug 2020 21:01:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Vulnerability-Mitigation-for-TLS-1-0-and-Weak-Ciphers/m-p/94894#M27457</guid>
      <dc:creator>fklim</dc:creator>
      <dc:date>2020-08-21T21:01:15Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability Mitigation for TLS 1.0 and Weak Ciphers</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Vulnerability-Mitigation-for-TLS-1-0-and-Weak-Ciphers/m-p/157825#M27458</link>
      <description>&lt;DIV&gt;&lt;P&gt;&lt;SPAN&gt;Follow -sk147272 , sk106031 to mitigate the above vulnerability.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;A href="https://urldefense.proofpoint.com/v2/url?u=https-3A__supportcenter.checkpoint.com_supportcenter_portal-3FeventSubmit-5FdoGoviewsolutiondetails-3D-26solutionid-3Dsk106031-26partition-3DAdvanced-26product-3DSecurity&amp;amp;d=DwMGaQ&amp;amp;c=jf_iaSHvJObTbx-siA1ZOg&amp;amp;r=6NAjy_uj658TqYmQbv7qeWV8aJz6Qy3asuuXGtTF4Kk&amp;amp;m=e-kR65xOp5E6Ye_hmBEdrHHOwrnDWTvk4yBzsu102TRrKd5o3BxcW-1p0H2tRdoV&amp;amp;s=bsU3q_qqebeuIVzWkvbDKzA1-KgTSMYP-LIMzUXPHnk&amp;amp;e=" target="_blank" rel="noopener"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk106031&amp;amp;partition=Advanced&amp;amp;product=Security&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;P&gt;&lt;BR /&gt;&lt;SPAN&gt;&lt;A href="https://urldefense.proofpoint.com/v2/url?u=https-3A__supportcenter.checkpoint.com_supportcenter_portal-3FeventSubmit-5FdoGoviewsolutiondetails-3D-26solutionid-3Dsk147272-26partition-3DAdvanced-26product-3DSecurity&amp;amp;d=DwMGaQ&amp;amp;c=jf_iaSHvJObTbx-siA1ZOg&amp;amp;r=6NAjy_uj658TqYmQbv7qeWV8aJz6Qy3asuuXGtTF4Kk&amp;amp;m=e-kR65xOp5E6Ye_hmBEdrHHOwrnDWTvk4yBzsu102TRrKd5o3BxcW-1p0H2tRdoV&amp;amp;s=ibyDr2Zk8PC7-UswOWC6SNVz59Brcc92tNjDlFAVaRs&amp;amp;e=" target="_blank" rel="noopener"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk147272&amp;amp;partition=Advanced&amp;amp;product=Security&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;/DIV&gt;</description>
      <pubDate>Thu, 22 Sep 2022 12:15:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Vulnerability-Mitigation-for-TLS-1-0-and-Weak-Ciphers/m-p/157825#M27458</guid>
      <dc:creator>Prime</dc:creator>
      <dc:date>2022-09-22T12:15:52Z</dc:date>
    </item>
  </channel>
</rss>

