<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: OpenSSL Vulnerability in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/OpenSSL-Vulnerability/m-p/160937#M28429</link>
    <description>&lt;DIV class=""&gt;
&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/48695"&gt;@dnpl&lt;/a&gt;&amp;nbsp;: Your link writes "&lt;EM&gt;Only OpenSSL versions 3.0 through 3.0.6 are vulnerable&lt;/EM&gt;", so &lt;STRONG&gt;&lt;FONT color="#008000"&gt;Check Point is not affected&lt;/FONT&gt;&lt;/STRONG&gt;.&lt;BR /&gt;Simply verify your openssl version with this command:&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;[Expert@fw:0]# cpopenssl version
OpenSSL 1.1.1n  15 Mar 2022
&lt;/LI-CODE&gt;
&lt;P&gt;Confirmed by Check Point in &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk92447" target="_self"&gt;sk92447&lt;/A&gt; and &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk180206" target="_self"&gt;sk180206&lt;/A&gt;.&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;</description>
    <pubDate>Tue, 01 Nov 2022 17:55:42 GMT</pubDate>
    <dc:creator>Danny</dc:creator>
    <dc:date>2022-11-01T17:55:42Z</dc:date>
    <item>
      <title>OpenSSL Vulnerability</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/OpenSSL-Vulnerability/m-p/160930#M28427</link>
      <description>&lt;P&gt;On Tuesday, November 1, 2022, the OpenSSL project will release a new version of OpenSSL version 3.0.7 that will patch an as-yet-undisclosed vulnerability in current versions of OpenSSL. See following for details:&lt;/P&gt;&lt;P&gt;&lt;A href="https://blog.qualys.com/vulnerabilities-threat-research/2022/10/31/qualys-research-alert-prepare-for-a-critical-vulnerability-in-openssl-3-0" target="_blank"&gt;https://blog.qualys.com/vulnerabilities-threat-research/2022/10/31/qualys-research-alert-prepare-for-a-critical-vulnerability-in-openssl-3-0&lt;/A&gt;&lt;/P&gt;&lt;P&gt;This is likely to impact Check Point Scanners and possibly every linux-based device and third-party software product we have which uses a web portal for management.&lt;/P&gt;&lt;P&gt;Is Checkpoint planning to release a fix for vulnerability?&lt;/P&gt;</description>
      <pubDate>Tue, 01 Nov 2022 15:44:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/OpenSSL-Vulnerability/m-p/160930#M28427</guid>
      <dc:creator>dnpl</dc:creator>
      <dc:date>2022-11-01T15:44:00Z</dc:date>
    </item>
    <item>
      <title>Re: OpenSSL Vulnerability</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/OpenSSL-Vulnerability/m-p/160931#M28428</link>
      <description>&lt;P&gt;We published a blog that no doubt will be updated as additional information becomes known including relevant IPS signatures &amp;amp; SK articles.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://blog.checkpoint.com/2022/10/30/openssl-gives-heads-up-to-critical-vulnerability-disclosure-check-point-alerts-organizations-to-prepare-now/" target="_blank"&gt;https://blog.checkpoint.com/2022/10/30/openssl-gives-heads-up-to-critical-vulnerability-disclosure-check-point-alerts-organizations-to-prepare-now/&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 01 Nov 2022 15:51:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/OpenSSL-Vulnerability/m-p/160931#M28428</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2022-11-01T15:51:41Z</dc:date>
    </item>
    <item>
      <title>Re: OpenSSL Vulnerability</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/OpenSSL-Vulnerability/m-p/160937#M28429</link>
      <description>&lt;DIV class=""&gt;
&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/48695"&gt;@dnpl&lt;/a&gt;&amp;nbsp;: Your link writes "&lt;EM&gt;Only OpenSSL versions 3.0 through 3.0.6 are vulnerable&lt;/EM&gt;", so &lt;STRONG&gt;&lt;FONT color="#008000"&gt;Check Point is not affected&lt;/FONT&gt;&lt;/STRONG&gt;.&lt;BR /&gt;Simply verify your openssl version with this command:&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;[Expert@fw:0]# cpopenssl version
OpenSSL 1.1.1n  15 Mar 2022
&lt;/LI-CODE&gt;
&lt;P&gt;Confirmed by Check Point in &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk92447" target="_self"&gt;sk92447&lt;/A&gt; and &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk180206" target="_self"&gt;sk180206&lt;/A&gt;.&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;</description>
      <pubDate>Tue, 01 Nov 2022 17:55:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/OpenSSL-Vulnerability/m-p/160937#M28429</guid>
      <dc:creator>Danny</dc:creator>
      <dc:date>2022-11-01T17:55:42Z</dc:date>
    </item>
    <item>
      <title>Re: OpenSSL Vulnerability</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/OpenSSL-Vulnerability/m-p/160938#M28430</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/687"&gt;@Danny&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So which version of OpenSSL does checkpoint use?&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 01 Nov 2022 18:00:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/OpenSSL-Vulnerability/m-p/160938#M28430</guid>
      <dc:creator>dnpl</dc:creator>
      <dc:date>2022-11-01T18:00:02Z</dc:date>
    </item>
    <item>
      <title>Re: OpenSSL Vulnerability</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/OpenSSL-Vulnerability/m-p/160939#M28431</link>
      <description>&lt;P&gt;Version 1.1.1 as shown in my post above and in&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk92447" target="_self" rel="noopener noreferrer"&gt;sk92447&lt;/A&gt;&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 01 Nov 2022 18:01:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/OpenSSL-Vulnerability/m-p/160939#M28431</guid>
      <dc:creator>Danny</dc:creator>
      <dc:date>2022-11-01T18:01:28Z</dc:date>
    </item>
    <item>
      <title>Re: OpenSSL Vulnerability</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/OpenSSL-Vulnerability/m-p/160948#M28432</link>
      <description>&lt;P&gt;We are not vulnerable. See here:&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/General-Topics/CVE-2022-3602-amp-CVE-2022-3786-in-relation-to-Check-Point/m-p/160942#M26896" target="_blank"&gt;https://community.checkpoint.com/t5/General-Topics/CVE-2022-3602-amp-CVE-2022-3786-in-relation-to-Check-Point/m-p/160942#M26896&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 01 Nov 2022 19:38:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/OpenSSL-Vulnerability/m-p/160948#M28432</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2022-11-01T19:38:41Z</dc:date>
    </item>
  </channel>
</rss>

