<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: vulnerability on firewall in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/vulnerability-on-firewall/m-p/166056#M29854</link>
    <description>&lt;P&gt;&lt;SPAN&gt;R80.40 JHF T58 is a version from before&amp;nbsp;19 July 2020. I would suggest to upgrade !&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;R81 JHF T69 is recent, but:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;Check Point Recommended version for all deployments is &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk170416#Installation" target="_blank" rel="noopener"&gt;R81.10 Take 335&lt;/A&gt; with its Recommended &lt;A href="https://sc1.checkpoint.com/documents/Jumbo_HFA/R81.10/Default.htm" target="_blank" rel="noopener"&gt;Jumbo Hotfix Accumulator&lt;/A&gt; Take 79&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 26 Dec 2022 10:37:35 GMT</pubDate>
    <dc:creator>G_W_Albrecht</dc:creator>
    <dc:date>2022-12-26T10:37:35Z</dc:date>
    <item>
      <title>vulnerability on firewall</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/vulnerability-on-firewall/m-p/166032#M29838</link>
      <description />
      <pubDate>Wed, 05 Apr 2023 08:22:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/vulnerability-on-firewall/m-p/166032#M29838</guid>
      <dc:creator>umar7</dc:creator>
      <dc:date>2023-04-05T08:22:08Z</dc:date>
    </item>
    <item>
      <title>Re: vulnerability on firewall</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/vulnerability-on-firewall/m-p/166046#M29850</link>
      <description>&lt;P&gt;Please note that this community is not an official support channel.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you need the assistance of support further to the answers provided in your previous thread on similar topics then please raise an SR with TAC.&lt;/P&gt;
&lt;P&gt;Please ensure gateways have a current JHF installed and that you have reviewed the SKs pertaining to the use of SHA-256 with the ICA etc.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;sk36343: Check Point response to OpenSSH CBC Mode Information Disclosure Vulnerability (CVE-2008-5161)&lt;BR /&gt;sk106031: How to change SSH encryption protocols and Message Authentication Code settings&lt;BR /&gt;sk65269: Status of OpenSSH CVEs&lt;BR /&gt;sk147272: Vulnerability scan shows that Gaia Portal supports SSL medium strength cipher suites&lt;BR /&gt;sk162542: Disable non-secure TLS and Cipher protocols&lt;BR /&gt;sk120774: Vulnerability scan shows that there are weak ciphers related to TLS 1.2&lt;BR /&gt;sk92447: Status of OpenSSL CVEs&lt;BR /&gt;sk108252: How to change Gaia Portal's certificate from SHA-1 to SHA-256&lt;BR /&gt;sk103840: SHA-1 and SHA-256 certificates in Check Point Internal CA (ICA)&lt;BR /&gt;sk100647: Check Point response to common false positives scanning results&lt;/P&gt;</description>
      <pubDate>Mon, 26 Dec 2022 06:28:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/vulnerability-on-firewall/m-p/166046#M29850</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2022-12-26T06:28:50Z</dc:date>
    </item>
    <item>
      <title>Re: vulnerability on firewall</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/vulnerability-on-firewall/m-p/166056#M29854</link>
      <description>&lt;P&gt;&lt;SPAN&gt;R80.40 JHF T58 is a version from before&amp;nbsp;19 July 2020. I would suggest to upgrade !&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;R81 JHF T69 is recent, but:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;Check Point Recommended version for all deployments is &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk170416#Installation" target="_blank" rel="noopener"&gt;R81.10 Take 335&lt;/A&gt; with its Recommended &lt;A href="https://sc1.checkpoint.com/documents/Jumbo_HFA/R81.10/Default.htm" target="_blank" rel="noopener"&gt;Jumbo Hotfix Accumulator&lt;/A&gt; Take 79&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 26 Dec 2022 10:37:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/vulnerability-on-firewall/m-p/166056#M29854</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2022-12-26T10:37:35Z</dc:date>
    </item>
  </channel>
</rss>

