<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Vulnerability scan shows ports 18231 uses weak ciphers in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Vulnerability-scan-shows-ports-18231-uses-weak-ciphers/m-p/230030#M44270</link>
    <description>&lt;P&gt;Hi Team,&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Checkpoint devices showing that weak ciphers are used on port 18231.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Current version on Gateway : R81.20 Take 76.&lt;/P&gt;&lt;P&gt;As per the&amp;nbsp;sk132712 the issue should have been resolved in R81.20 . But we still see this vulnerability in the scan report.&lt;/P&gt;&lt;P&gt;Can you please let us know if there is any other solution to this ?&lt;/P&gt;&lt;P&gt;Attached is the scan report of the same.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 17 Oct 2024 14:54:21 GMT</pubDate>
    <dc:creator>Bachan</dc:creator>
    <dc:date>2024-10-17T14:54:21Z</dc:date>
    <item>
      <title>Vulnerability scan shows ports 18231 uses weak ciphers</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Vulnerability-scan-shows-ports-18231-uses-weak-ciphers/m-p/230030#M44270</link>
      <description>&lt;P&gt;Hi Team,&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Checkpoint devices showing that weak ciphers are used on port 18231.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Current version on Gateway : R81.20 Take 76.&lt;/P&gt;&lt;P&gt;As per the&amp;nbsp;sk132712 the issue should have been resolved in R81.20 . But we still see this vulnerability in the scan report.&lt;/P&gt;&lt;P&gt;Can you please let us know if there is any other solution to this ?&lt;/P&gt;&lt;P&gt;Attached is the scan report of the same.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 17 Oct 2024 14:54:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Vulnerability-scan-shows-ports-18231-uses-weak-ciphers/m-p/230030#M44270</guid>
      <dc:creator>Bachan</dc:creator>
      <dc:date>2024-10-17T14:54:21Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability scan shows ports 18231 uses weak ciphers</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Vulnerability-scan-shows-ports-18231-uses-weak-ciphers/m-p/230071#M44272</link>
      <description>&lt;P&gt;I'll forward this to the relevant R&amp;amp;D owner but the SK details how to disable the Legacy Desktop Policy process.&lt;/P&gt;
&lt;P&gt;Do you use Policy Server and Desktop Policy enabled?&lt;/P&gt;
&lt;P&gt;"&lt;SPAN&gt;For other versions and Jumbo Hotfixes;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;You can disable the daemon completely by editing the&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;implied_rules.def&lt;/EM&gt;&lt;SPAN&gt;, and removing/commenting the relevant lines:"&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 17 Oct 2024 18:11:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Vulnerability-scan-shows-ports-18231-uses-weak-ciphers/m-p/230071#M44272</guid>
      <dc:creator>Tal_Paz-Fridman</dc:creator>
      <dc:date>2024-10-17T18:11:48Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability scan shows ports 18231 uses weak ciphers</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Vulnerability-scan-shows-ports-18231-uses-weak-ciphers/m-p/230074#M44273</link>
      <description>&lt;P&gt;Have you tried disabling dtpsd as described in the SK?&lt;/P&gt;</description>
      <pubDate>Thu, 17 Oct 2024 18:24:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Vulnerability-scan-shows-ports-18231-uses-weak-ciphers/m-p/230074#M44273</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-10-17T18:24:42Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability scan shows ports 18231 uses weak ciphers</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Vulnerability-scan-shows-ports-18231-uses-weak-ciphers/m-p/230076#M44274</link>
      <description>&lt;P&gt;Can you try follow below from the sk?&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can disable the daemon completely by editing the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;implied_rules.def&lt;/EM&gt;, and removing/commenting the relevant lines:&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Open the relevant Gateway object properties in SmartDashboard and uncheck the box “Policy Server” under the “IPSec VPN” blade, click OK (Do not push policy) and close the SmartDashboard.&lt;/LI&gt;
&lt;LI&gt;Open ssh / console connection to the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Management Server&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI&gt;Change directory to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;$FWDIR/lib&lt;/EM&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;: (&lt;EM&gt;cd $FWDIR/lib&lt;/EM&gt;)
&lt;P&gt;&lt;STRONG&gt;Note:&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;For the location of the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;implied_rules.def&lt;/EM&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;file on the Management server, refer to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk92281" target="_blank" rel="noopener"&gt;sk92281&lt;/A&gt;.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;Open the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;implied_rules.def&lt;/EM&gt;&amp;nbsp;file with vim:&lt;BR /&gt;
&lt;P&gt;&lt;EM&gt;[Expert@HostName:0]# vim&amp;nbsp;implied_rules.def&lt;/EM&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;Comment the following lines:&lt;BR /&gt;
&lt;P&gt;&lt;STRONG&gt;Before the change:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;#define ENABLE_FWD_TOPO&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;#define ENABLE_FW1_PSLOGON_NG&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;After the change:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;&lt;SPAN&gt;/*#define ENABLE_FWD_TOPO*/&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;/*#define ENABLE_FW1_PSLOGON_NG*/&lt;/EM&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;Save the modified file.&lt;/LI&gt;
&lt;LI&gt;Install Policy on the relevant gateway.&lt;/LI&gt;
&lt;/OL&gt;</description>
      <pubDate>Thu, 17 Oct 2024 19:23:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Vulnerability-scan-shows-ports-18231-uses-weak-ciphers/m-p/230076#M44274</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-10-17T19:23:00Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability scan shows ports 18231 uses weak ciphers</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Vulnerability-scan-shows-ports-18231-uses-weak-ciphers/m-p/230107#M44283</link>
      <description>&lt;P&gt;Hi Rock,&lt;/P&gt;&lt;P&gt;As mentioned in &lt;SPAN&gt;sk132712&amp;nbsp; " The workaround is given for &lt;STRONG&gt;other version&lt;/STRONG&gt;" . But we are running on the checkpoint fixed version(R81.20 Take 76). Is it still recommended to do this ?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 18 Oct 2024 07:37:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Vulnerability-scan-shows-ports-18231-uses-weak-ciphers/m-p/230107#M44283</guid>
      <dc:creator>Bachan</dc:creator>
      <dc:date>2024-10-18T07:37:21Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability scan shows ports 18231 uses weak ciphers</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Vulnerability-scan-shows-ports-18231-uses-weak-ciphers/m-p/230136#M44285</link>
      <description>&lt;P&gt;Good question. I cant say 100%. as I dont know, so maybe better verify with TAC, to get an official answer. However, I will say this...if you decide to do it, please backup everything first.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Fri, 18 Oct 2024 11:52:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Vulnerability-scan-shows-ports-18231-uses-weak-ciphers/m-p/230136#M44285</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-10-18T11:52:40Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability scan shows ports 18231 uses weak ciphers</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Vulnerability-scan-shows-ports-18231-uses-weak-ciphers/m-p/230146#M44289</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Do you use Policy Server and Desktop Policy enabled?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Yes, we have both the features enabled.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 18 Oct 2024 13:36:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Vulnerability-scan-shows-ports-18231-uses-weak-ciphers/m-p/230146#M44289</guid>
      <dc:creator>Bachan</dc:creator>
      <dc:date>2024-10-18T13:36:36Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability scan shows ports 18231 uses weak ciphers</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Vulnerability-scan-shows-ports-18231-uses-weak-ciphers/m-p/230148#M44290</link>
      <description>&lt;P&gt;Hi Rock,&lt;/P&gt;&lt;P&gt;We will give a shot on the test environment to implement this SK and update you.&lt;/P&gt;</description>
      <pubDate>Fri, 18 Oct 2024 13:38:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Vulnerability-scan-shows-ports-18231-uses-weak-ciphers/m-p/230148#M44290</guid>
      <dc:creator>Bachan</dc:creator>
      <dc:date>2024-10-18T13:38:30Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability scan shows ports 18231 uses weak ciphers</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Vulnerability-scan-shows-ports-18231-uses-weak-ciphers/m-p/230153#M44292</link>
      <description>&lt;P&gt;sounds good.&lt;/P&gt;</description>
      <pubDate>Fri, 18 Oct 2024 13:54:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Vulnerability-scan-shows-ports-18231-uses-weak-ciphers/m-p/230153#M44292</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-10-18T13:54:24Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability scan shows ports 18231 uses weak ciphers</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Vulnerability-scan-shows-ports-18231-uses-weak-ciphers/m-p/232905#M45042</link>
      <description>&lt;P&gt;Hi Rock,&lt;/P&gt;&lt;P&gt;We performed the &lt;SPAN&gt;sk132712&amp;nbsp;&amp;nbsp;and this didnt resolve our issue.&amp;nbsp;After policy installation the gateway stopped listening on port 18231, but after making VPN connection the icon for Compliance on Endpoint VPN Client changed to grey(Greyed out) and status to Off. So this solution will not work of our environment. Hence we ended up opening TAC. TAC provided us the below solution.&lt;/SPAN&gt;&lt;/P&gt;&lt;DIV&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;Follow the steps - (Make this changes on Gateway)&lt;/SPAN&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;OL&gt;&lt;LI&gt;If you do not need policy on the client, you can uncheck the policy server checkbox on the GW.&lt;/LI&gt;&lt;LI&gt;If you do need policy, you can edit fwauthd.conf that is located in $FWDIR/conf and mark out the policy server processes as follow:&lt;/LI&gt;&lt;/OL&gt;&lt;DIV&gt;&lt;P&gt;&lt;SPAN&gt;*#*0 dtps dtpsd respawn 0&lt;/SPAN&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;P&gt;&lt;SPAN&gt;*#*0 dtls dtlsd respawn 0&lt;/SPAN&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;P&gt;&lt;SPAN&gt;Then perform&amp;nbsp; cprestart on the GW. Do a cpstop; cpstart in a maintenance window.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;P&gt;&lt;SPAN&gt;3. After this, the policy server should be shown down.&lt;/SPAN&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;P&gt;&lt;SPAN&gt;4. After that, we need to apply the hotfix(Contact TAC). The hotfix will assist to make the configuration changes permanent.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;P&gt;&lt;SPAN&gt;5. Check the status of port 18231 -&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;# netstat -tulnp |grep 18231&lt;BR /&gt;# netstat –atun |grep 18231&lt;BR /&gt;&lt;BR /&gt;Note: Checkpoint has created PRHF-32277 for this issue and they don't have any plans to integrate this issue in next JHF anytime soon. So for every upgrade, we need to reach TAC for hot-patch.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 15 Nov 2024 15:45:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Vulnerability-scan-shows-ports-18231-uses-weak-ciphers/m-p/232905#M45042</guid>
      <dc:creator>Bachan</dc:creator>
      <dc:date>2024-11-15T15:45:20Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability scan shows ports 18231 uses weak ciphers</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Vulnerability-scan-shows-ports-18231-uses-weak-ciphers/m-p/232907#M45043</link>
      <description>&lt;P&gt;Excellent update, thank you very much for that! Glad its solved.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Fri, 15 Nov 2024 15:59:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Vulnerability-scan-shows-ports-18231-uses-weak-ciphers/m-p/232907#M45043</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-11-15T15:59:10Z</dc:date>
    </item>
  </channel>
</rss>

