<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: OpenSSH vulnerable in Check Point R80.20 in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/OpenSSH-vulnerable-in-Check-Point-R80-20/m-p/107332#M77185</link>
    <description>&lt;P&gt;What was the precise issue found?&lt;BR /&gt;If it is the one in that SK, yes, we patched that issue in our version of OpenSSH.&lt;BR /&gt;Some issues do require a newer version of OpenSSH which requires upgrading.&lt;/P&gt;</description>
    <pubDate>Sat, 09 Jan 2021 00:39:46 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2021-01-09T00:39:46Z</dc:date>
    <item>
      <title>OpenSSH vulnerable in Check Point R80.20</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/OpenSSH-vulnerable-in-Check-Point-R80-20/m-p/107241#M77184</link>
      <description>&lt;P&gt;Recently we had a pentration test on our Azure data centre. And they hignlighted an issue with OpenSSH within Check Point R80.20. Is it possible to upgrade OpenSSH within Check Point R80.20 or do we need to upgrade Check point to R80.40 to get around this issue?&lt;/P&gt;&lt;P&gt;I found the following post regarding relevant fixes made to Check Point OpenSSH package. Is this still relevant now Check Point R80.20?&lt;/P&gt;&lt;P&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk61744" target="_blank"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk61744&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 07 Jan 2021 17:28:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/OpenSSH-vulnerable-in-Check-Point-R80-20/m-p/107241#M77184</guid>
      <dc:creator>dnpl</dc:creator>
      <dc:date>2021-01-07T17:28:25Z</dc:date>
    </item>
    <item>
      <title>Re: OpenSSH vulnerable in Check Point R80.20</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/OpenSSH-vulnerable-in-Check-Point-R80-20/m-p/107332#M77185</link>
      <description>&lt;P&gt;What was the precise issue found?&lt;BR /&gt;If it is the one in that SK, yes, we patched that issue in our version of OpenSSH.&lt;BR /&gt;Some issues do require a newer version of OpenSSH which requires upgrading.&lt;/P&gt;</description>
      <pubDate>Sat, 09 Jan 2021 00:39:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/OpenSSH-vulnerable-in-Check-Point-R80-20/m-p/107332#M77185</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-01-09T00:39:46Z</dc:date>
    </item>
    <item>
      <title>Re: OpenSSH vulnerable in Check Point R80.20</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/OpenSSH-vulnerable-in-Check-Point-R80-20/m-p/107469#M77186</link>
      <description>&lt;P&gt;So this is the message we recieved :-&lt;/P&gt;&lt;P&gt;We have observed that the SSH service (port TCP/22), exposed in the environment was identified as the outdated OpenSSH version 4.3 released in 2006, and that is found to be affected by at least 17 security issues2.&lt;/P&gt;&lt;P&gt;Although we found that the vendor, Check Point, has backported patches for OpenSSH 4.3 that mitigates CVE-2006-5051 and CVE-2006-49243 in Check Point R80.20, we were not able to identify that issues discovered in later versions of said software4, has also been backported for the version in question.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Jan 2021 12:08:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/OpenSSH-vulnerable-in-Check-Point-R80-20/m-p/107469#M77186</guid>
      <dc:creator>dnpl</dc:creator>
      <dc:date>2021-01-11T12:08:05Z</dc:date>
    </item>
    <item>
      <title>Re: OpenSSH vulnerable in Check Point R80.20</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/OpenSSH-vulnerable-in-Check-Point-R80-20/m-p/107550#M77187</link>
      <description>&lt;P&gt;Most likely, we've patched them or determined they are not relevant because of how we've compiled or deployed OpenSSH.&lt;BR /&gt;If you can get a precise list of CVEs, this can probably be confirmed by searching SecureKnowledge.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Jan 2021 01:27:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/OpenSSH-vulnerable-in-Check-Point-R80-20/m-p/107550#M77187</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-01-12T01:27:09Z</dc:date>
    </item>
    <item>
      <title>Re: OpenSSH vulnerable in Check Point R80.20</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/OpenSSH-vulnerable-in-Check-Point-R80-20/m-p/107752#M77188</link>
      <description>&lt;P&gt;Here is a list of CVE's identified as security issues :--&lt;/P&gt;&lt;P&gt;CVE-2017-15906&lt;BR /&gt;CVE-2016-10708&lt;BR /&gt;CVE-2014-1692&lt;BR /&gt;CVE-2012-0814&lt;BR /&gt;CVE-2011-5000&lt;BR /&gt;CVE-2011-4327&lt;BR /&gt;CVE-2010-5107&lt;BR /&gt;CVE-2010-4755&lt;BR /&gt;CVE-2010-4478&lt;BR /&gt;CVE-2009-2904&lt;BR /&gt;CVE-2008-4109&lt;BR /&gt;CVE-2008-3259&lt;BR /&gt;CVE-2007-4752&lt;BR /&gt;CVE-2007-2243&lt;BR /&gt;CVE-2006-5052&lt;BR /&gt;CVE-2006-5051&lt;BR /&gt;CVE-2006-4924&lt;BR /&gt;&lt;BR /&gt;The following link contains more information on each security&amp;nbsp;&lt;A href="https://www.cvedetails.com/vulnerability-list/vendor_id-97/product_id-585/version_id-37157/Openbsd-Openssh-4.3.html" target="_blank"&gt;https://www.cvedetails.com/vulnerability-list/vendor_id-97/product_id-585/version_id-37157/Openbsd-Openssh-4.3.html&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 13 Jan 2021 17:58:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/OpenSSH-vulnerable-in-Check-Point-R80-20/m-p/107752#M77188</guid>
      <dc:creator>dnpl</dc:creator>
      <dc:date>2021-01-13T17:58:24Z</dc:date>
    </item>
    <item>
      <title>Re: OpenSSH vulnerable in Check Point R80.20</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/OpenSSH-vulnerable-in-Check-Point-R80-20/m-p/107759#M77189</link>
      <description>&lt;P&gt;I’m guessing most of these CVEs are listed here:&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk65269&amp;amp;partition=Basic&amp;amp;product=All" target="_blank"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk65269&amp;amp;partition=Basic&amp;amp;product=All&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;For any that aren’t, I recommend a TAC case to get a formal answer.&lt;/P&gt;</description>
      <pubDate>Wed, 13 Jan 2021 20:05:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/OpenSSH-vulnerable-in-Check-Point-R80-20/m-p/107759#M77189</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-01-13T20:05:57Z</dc:date>
    </item>
  </channel>
</rss>

