<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: CVE-2022-3602 &amp;amp; CVE-2022-3786 in relation to Check Point products in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/CVE-2022-3602-amp-CVE-2022-3786-in-relation-to-Check-Point/m-p/160980#M26909</link>
    <description>&lt;P&gt;Here is a quote from the related &lt;A href="https://blog.checkpoint.com/2022/10/30/openssl-gives-heads-up-to-critical-vulnerability-disclosure-check-point-alerts-organizations-to-prepare-now/" target="_self"&gt;Check Point Blog article&lt;/A&gt;: "&lt;SPAN&gt;Check Point Researchers are keeping a close watch on this story and we will report back as development becomes available"&lt;BR /&gt;&lt;BR /&gt;Also, look &lt;A href="https://blog.checkpoint.com/2022/11/01/openssl-vulnerability-cve-2022-3602-remote-code-execution-and-cve-2022-3786-denial-of-service-check-point-research-update/" target="_self"&gt;here&lt;/A&gt;:&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2&gt;&lt;EM&gt;What can I do until further details are revealed?&lt;/EM&gt;&lt;/H2&gt;
&lt;P&gt;&lt;EM&gt;In the meantime, organizations should stay alert and utilize security’s best practices, including patching and updating all systems to the latest operating system, and getting ready to update IPS once they become available.&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;Customer Guidance for reported security update OpenSSL 3.0.0 to 3.0.6 versions&lt;/STRONG&gt;&amp;nbsp;is available&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk180206" target="_blank"&gt;here&lt;/A&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;At any given moment, if you feel you’ve been breached or under attack contact our&amp;nbsp;&lt;A href="https://www.checkpoint.com/support-services/threatcloud-incident-response/" target="_blank"&gt;Emergency Response Hotline&lt;/A&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;In addition our worldwide Technical Assistance Centers are&amp;nbsp;&lt;A href="https://www.checkpoint.com/support-services/contact-support/" target="_blank"&gt;available&lt;/A&gt;&amp;nbsp;to assist you 24 x 7.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;My understanding is, it is still in the works. Actual exploitation tools are required to produce IPS signatures, and none are known at this point.&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 02 Nov 2022 07:41:31 GMT</pubDate>
    <dc:creator>_Val_</dc:creator>
    <dc:date>2022-11-02T07:41:31Z</dc:date>
    <item>
      <title>CVE-2022-3602 &amp; CVE-2022-3786 in relation to Check Point products</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CVE-2022-3602-amp-CVE-2022-3786-in-relation-to-Check-Point/m-p/160942#M26896</link>
      <description>&lt;P&gt;On Tuesday, 1 November 2022, the OpenSSL project team released OpenSSL 3.0.7 update as a security-fix release (&lt;A href="https://www.openssl.org/news/secadv/20221101.txt" target="_blank" rel="noopener"&gt;OpenSSL Advisory&lt;/A&gt;).&lt;/P&gt;
&lt;P&gt;This release includes 2 HIGH severity vulnerabilities and was assigned to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;CVE-2022-3602&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;(Reduced from Critical)&lt;STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&amp;amp; CVE-2022-3786&lt;/STRONG&gt;. These buffer overflow vulnerabilities in the Certificate could result in a denial of service or potentially remote code execution on affected versions.&lt;/P&gt;
&lt;P&gt;The update affects only OpenSSL versions 3.0.0 through 3.0.6. (Version 3.0 was first released in September 2021). OpenSSL version 1.x is not affected by this vulnerability, therefore older operating systems and devices are safe.&lt;/P&gt;
&lt;P&gt;Just to clarify, Check Point is using&amp;nbsp;&lt;SPAN&gt;OpenSSL 1.1.1 release and therefore is not vulnerable.&lt;BR /&gt;&lt;BR /&gt;For more information, please refer to&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk180206" target="_self"&gt;sk180206&lt;/A&gt; and&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk92447" target="_self"&gt;sk92447&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 01 Nov 2022 19:09:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CVE-2022-3602-amp-CVE-2022-3786-in-relation-to-Check-Point/m-p/160942#M26896</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2022-11-01T19:09:04Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2022-3602 &amp; CVE-2022-3786 in relation to Check Point products</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CVE-2022-3602-amp-CVE-2022-3786-in-relation-to-Check-Point/m-p/160951#M26901</link>
      <description>&lt;P&gt;Any word on an IPS protection to catch malicious certificates trying to exploit these on other systems?&lt;/P&gt;</description>
      <pubDate>Tue, 01 Nov 2022 19:48:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CVE-2022-3602-amp-CVE-2022-3786-in-relation-to-Check-Point/m-p/160951#M26901</guid>
      <dc:creator>Bob_Zimmerman</dc:creator>
      <dc:date>2022-11-01T19:48:07Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2022-3602 &amp; CVE-2022-3786 in relation to Check Point products</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CVE-2022-3602-amp-CVE-2022-3786-in-relation-to-Check-Point/m-p/160980#M26909</link>
      <description>&lt;P&gt;Here is a quote from the related &lt;A href="https://blog.checkpoint.com/2022/10/30/openssl-gives-heads-up-to-critical-vulnerability-disclosure-check-point-alerts-organizations-to-prepare-now/" target="_self"&gt;Check Point Blog article&lt;/A&gt;: "&lt;SPAN&gt;Check Point Researchers are keeping a close watch on this story and we will report back as development becomes available"&lt;BR /&gt;&lt;BR /&gt;Also, look &lt;A href="https://blog.checkpoint.com/2022/11/01/openssl-vulnerability-cve-2022-3602-remote-code-execution-and-cve-2022-3786-denial-of-service-check-point-research-update/" target="_self"&gt;here&lt;/A&gt;:&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2&gt;&lt;EM&gt;What can I do until further details are revealed?&lt;/EM&gt;&lt;/H2&gt;
&lt;P&gt;&lt;EM&gt;In the meantime, organizations should stay alert and utilize security’s best practices, including patching and updating all systems to the latest operating system, and getting ready to update IPS once they become available.&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;Customer Guidance for reported security update OpenSSL 3.0.0 to 3.0.6 versions&lt;/STRONG&gt;&amp;nbsp;is available&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk180206" target="_blank"&gt;here&lt;/A&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;At any given moment, if you feel you’ve been breached or under attack contact our&amp;nbsp;&lt;A href="https://www.checkpoint.com/support-services/threatcloud-incident-response/" target="_blank"&gt;Emergency Response Hotline&lt;/A&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;In addition our worldwide Technical Assistance Centers are&amp;nbsp;&lt;A href="https://www.checkpoint.com/support-services/contact-support/" target="_blank"&gt;available&lt;/A&gt;&amp;nbsp;to assist you 24 x 7.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;My understanding is, it is still in the works. Actual exploitation tools are required to produce IPS signatures, and none are known at this point.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 02 Nov 2022 07:41:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CVE-2022-3602-amp-CVE-2022-3786-in-relation-to-Check-Point/m-p/160980#M26909</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2022-11-02T07:41:31Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2022-3602 &amp; CVE-2022-3786 in relation to Check Point products</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CVE-2022-3602-amp-CVE-2022-3786-in-relation-to-Check-Point/m-p/161280#M26966</link>
      <description>&lt;P&gt;IPS update was released yesterday. It's described in&amp;nbsp;&lt;SPAN&gt;sk180206, and the protection name is&amp;nbsp;&lt;A href="https://advisories.checkpoint.com/defense/advisories/public/2022/cpai-2022-0784.html" target="_self"&gt;OpenSSL Buffer Overflow (CVE-2022-3602; CVE-2022-3786).&lt;/A&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 04 Nov 2022 18:15:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CVE-2022-3602-amp-CVE-2022-3786-in-relation-to-Check-Point/m-p/161280#M26966</guid>
      <dc:creator>Bob_Zimmerman</dc:creator>
      <dc:date>2022-11-04T18:15:26Z</dc:date>
    </item>
  </channel>
</rss>

