<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SSL Certificate Cannot Be Trusted (vulnerability) in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SSL-Certificate-Cannot-Be-Trusted-vulnerability/m-p/157898#M27464</link>
    <description>&lt;P&gt;Note that on Nessus scanner has installed public CA&amp;nbsp;&lt;/P&gt;&lt;P&gt;on the checkpoint, gateway have installed public CA&amp;nbsp;&lt;/P&gt;&lt;P&gt;object gateways &amp;gt; property &amp;gt; platform portal &amp;gt; import certificate p.12 format&amp;nbsp;&lt;/P&gt;&lt;P&gt;After import Nessus re-scan a new one, the result still the same with SSL cannot be trusted&lt;/P&gt;</description>
    <pubDate>Fri, 23 Sep 2022 08:48:18 GMT</pubDate>
    <dc:creator>leangm</dc:creator>
    <dc:date>2022-09-23T08:48:18Z</dc:date>
    <item>
      <title>SSL Certificate Cannot Be Trusted (vulnerability)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SSL-Certificate-Cannot-Be-Trusted-vulnerability/m-p/157897#M27463</link>
      <description>&lt;P&gt;Hello community&amp;nbsp;&lt;/P&gt;&lt;P&gt;Nessus scanner detected on checkpoint security and gateway&amp;nbsp;&lt;/P&gt;&lt;P&gt;show&amp;nbsp;&lt;/P&gt;&lt;H4&gt;SSL Certificate Cannot Be Trusted (&lt;SPAN&gt;MEDIUM)&lt;/SPAN&gt;&lt;/H4&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;H5&gt;Description&lt;/H5&gt;&lt;DIV class=""&gt;The server's X.509 certificate cannot be trusted. This situation can occur in three different ways, in which the chain of trust can be broken, as stated below :&lt;BR /&gt;&lt;BR /&gt;- First, the top of the certificate chain sent by the server might not be descended from a known public certificate authority. This can occur either when the top of the chain is an unrecognized, self-signed certificate, or when intermediate certificates are missing that would connect the top of the certificate chain to a known public certificate authority.&lt;BR /&gt;&lt;BR /&gt;- Second, the certificate chain may contain a certificate that is not valid at the time of the scan. This can occur either when the scan occurs before one of the certificate's 'notBefore' dates, or after one of the certificate's 'notAfter' dates.&lt;BR /&gt;&lt;BR /&gt;- Third, the certificate chain may contain a signature that either didn't match the certificate's information or could not be verified. Bad signatures can be fixed by getting the certificate with the bad signature to be re-signed by its issuer. Signatures that could not be verified are the result of the certificate's issuer using a signing algorithm that Nessus either does not support or does not recognize.&lt;BR /&gt;&lt;BR /&gt;If the remote host is a public host in production, any break in the chain makes it more difficult for users to verify the authenticity and identity of the web server. This could make it easier to carry out man-in-the-middle attacks against the remote host.&lt;/DIV&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;H5&gt;Solution&lt;/H5&gt;&lt;DIV class=""&gt;Purchase or generate a proper SSL certificate for this service.&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;H5&gt;Output&lt;/H5&gt;&lt;UL class=""&gt;&lt;LI&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;PRE&gt;The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : L=Locality Name (eg, city)/CN=192.168.0.166/E=Email Address/1.2.840.113549.1.9.2=An optional company name
|-Issuer  : L=Locality Name (eg, city)/CN=192.168.0.166/E=Email Address/1.2.840.113549.1.9.2=An optional company name&lt;/PRE&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;Port Hosts &lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;SPAN class=""&gt;8443 / tcp&lt;/SPAN&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;192.168.0.166&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;</description>
      <pubDate>Fri, 23 Sep 2022 08:40:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SSL-Certificate-Cannot-Be-Trusted-vulnerability/m-p/157897#M27463</guid>
      <dc:creator>leangm</dc:creator>
      <dc:date>2022-09-23T08:40:31Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Certificate Cannot Be Trusted (vulnerability)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SSL-Certificate-Cannot-Be-Trusted-vulnerability/m-p/157898#M27464</link>
      <description>&lt;P&gt;Note that on Nessus scanner has installed public CA&amp;nbsp;&lt;/P&gt;&lt;P&gt;on the checkpoint, gateway have installed public CA&amp;nbsp;&lt;/P&gt;&lt;P&gt;object gateways &amp;gt; property &amp;gt; platform portal &amp;gt; import certificate p.12 format&amp;nbsp;&lt;/P&gt;&lt;P&gt;After import Nessus re-scan a new one, the result still the same with SSL cannot be trusted&lt;/P&gt;</description>
      <pubDate>Fri, 23 Sep 2022 08:48:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SSL-Certificate-Cannot-Be-Trusted-vulnerability/m-p/157898#M27464</guid>
      <dc:creator>leangm</dc:creator>
      <dc:date>2022-09-23T08:48:18Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Certificate Cannot Be Trusted (vulnerability)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SSL-Certificate-Cannot-Be-Trusted-vulnerability/m-p/160950#M28415</link>
      <description>&lt;P&gt;Is there a way to do it on the manager as well?&amp;nbsp; My gws have been updated.&amp;nbsp; There is no platform portal on the manager for smart console.&amp;nbsp; &amp;nbsp;Does a wildcard certificate need to be added in the webui, under certificate authority?&amp;nbsp; I'm not seeing how to fix this Nessus medium flag on a manager.&lt;/P&gt;
&lt;H4 class="add-plugin-id-tip"&gt;SSL Certificate Cannot Be Trusted&lt;/H4&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 01 Nov 2022 19:42:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SSL-Certificate-Cannot-Be-Trusted-vulnerability/m-p/160950#M28415</guid>
      <dc:creator>Daniel_Kavan</dc:creator>
      <dc:date>2022-11-01T19:42:05Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Certificate Cannot Be Trusted (vulnerability)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SSL-Certificate-Cannot-Be-Trusted-vulnerability/m-p/160968#M28419</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;/P&gt;&lt;P&gt;you need to generate a CSR file for a gateway or your management&amp;nbsp;&lt;/P&gt;&lt;P&gt;then sign it with the internal CA&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk109593&amp;amp;partition=Advanced&amp;amp;product=Quantum" target="_blank"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk109593&amp;amp;partition=Advanced&amp;amp;product=Quantum&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 02 Nov 2022 01:34:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SSL-Certificate-Cannot-Be-Trusted-vulnerability/m-p/160968#M28419</guid>
      <dc:creator>leangm</dc:creator>
      <dc:date>2022-11-02T01:34:50Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Certificate Cannot Be Trusted (vulnerability)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SSL-Certificate-Cannot-Be-Trusted-vulnerability/m-p/161029#M28459</link>
      <description>&lt;P&gt;Thanks for the link!&amp;nbsp; I already have a wildcard certificate that I want to use.&amp;nbsp; &amp;nbsp; On the gws I can update it in the platform portal, but for the manager, it looks like I need to follow steps 10-12 of &lt;SPAN&gt;sk109593&lt;/SPAN&gt;&amp;nbsp;with my wildcard certificate.&lt;/P&gt;
&lt;P&gt;After sk109593 (steps 10-12) for me&amp;nbsp;&lt;SPAN&gt;SSL Certificate Cannot Be Trusted is still showing up but SSL Self-Signed Certificate is not after putting in the wildcard.&amp;nbsp; SIC is fine.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 09 Nov 2022 19:10:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SSL-Certificate-Cannot-Be-Trusted-vulnerability/m-p/161029#M28459</guid>
      <dc:creator>Daniel_Kavan</dc:creator>
      <dc:date>2022-11-09T19:10:59Z</dc:date>
    </item>
  </channel>
</rss>

