<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic CVE-2024-3094 [CRITICAL Vulnerability Just Disclosed (CVSS-10)] in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/CVE-2024-3094-CRITICAL-Vulnerability-Just-Disclosed-CVSS-10/m-p/210043#M34777</link>
    <description>&lt;P&gt;Hi All,&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;There has been a disclosure of a significant vulnerability in the Linux liblzma library a few hours back. Due to its widespread use across various Linux distributions.&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;With a CVSS Score of 10&lt;/STRONG&gt;&lt;SPAN&gt;,&amp;nbsp;&lt;/SPAN&gt;&lt;U&gt;this vulnerability is considered highly critical.&lt;/U&gt;&lt;/P&gt;
&lt;P&gt;At least I performed quick scan through firewall appliances for version R81, 81.10 and 81.20 and it seems&amp;nbsp; xz version 5.2.5 which is not vulnerable.&lt;/P&gt;
&lt;P&gt;command to run and find out the version is from expert mode&lt;/P&gt;
&lt;P&gt;#xz -V&lt;/P&gt;
&lt;P&gt;Here are few references:&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://nvd.nist.gov/vuln/detail/CVE-2024-3094" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://nvd.nist.gov/vuln/detail/CVE-2024-3094&amp;amp;source=gmail&amp;amp;ust=1711865908023000&amp;amp;usg=AOvVaw0TnP0nwwi1_OqjwwvJfKe0"&gt;https://nvd.nist.gov/vuln/&lt;WBR /&gt;detail/CVE-2024-3094&lt;/A&gt;&lt;FONT face="tahoma, sans-serif"&gt;&lt;BR /&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;DIV class="gmail_default"&gt;&lt;A href="https://access.redhat.com/security/cve/CVE-2024-3094" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://access.redhat.com/security/cve/CVE-2024-3094&amp;amp;source=gmail&amp;amp;ust=1711865908023000&amp;amp;usg=AOvVaw2VgL4od7nh-yq8FZrq9CiD"&gt;https://access.redhat.com/&lt;WBR /&gt;security/cve/CVE-2024-3094&lt;/A&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV class="gmail_default"&gt;&lt;A href="https://www.thestack.technology/malicious-linux-backdoor-cvss-10-cve-2024-3094/" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://www.thestack.technology/malicious-linux-backdoor-cvss-10-cve-2024-3094/&amp;amp;source=gmail&amp;amp;ust=1711865908023000&amp;amp;usg=AOvVaw2brCCcxxQ4xK67z1G5G7UF"&gt;https://www.thestack.&lt;WBR /&gt;technology/malicious-linux-&lt;WBR /&gt;backdoor-cvss-10-cve-2024-&lt;WBR /&gt;3094/&lt;/A&gt;&lt;/DIV&gt;
&lt;DIV class="gmail_default"&gt;&lt;A href="https://www.cisa.gov/news-events/alerts/2024/03/29/reported-supply-chain-compromise-affecting-xz-utils-data-compression-library-cve-2024-3094" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://www.cisa.gov/news-events/alerts/2024/03/29/reported-supply-chain-compromise-affecting-xz-utils-data-compression-library-cve-2024-3094&amp;amp;source=gmail&amp;amp;ust=1711865908023000&amp;amp;usg=AOvVaw1br6rhlKnApoodTdJCWvX9"&gt;https://www.cisa.gov/news-&lt;WBR /&gt;events/alerts/2024/03/29/&lt;WBR /&gt;reported-supply-chain-&lt;WBR /&gt;compromise-affecting-xz-utils-&lt;WBR /&gt;data-compression-library-cve-&lt;WBR /&gt;2024-3094&lt;/A&gt;&lt;/DIV&gt;
&lt;DIV class="gmail_default"&gt;&lt;A href="https://www.gamingonlinux.com/2024/03/xz-tools-and-libraries-compromised-with-a-critical-issue/" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://www.gamingonlinux.com/2024/03/xz-tools-and-libraries-compromised-with-a-critical-issue/&amp;amp;source=gmail&amp;amp;ust=1711865908023000&amp;amp;usg=AOvVaw1ZidhA1FtLOyFbiCZ7xB-D"&gt;https://www.gamingonlinux.com/&lt;WBR /&gt;2024/03/xz-tools-and-&lt;WBR /&gt;libraries-compromised-with-a-&lt;WBR /&gt;critical-issue/&lt;/A&gt;&lt;/DIV&gt;</description>
    <pubDate>Sat, 30 Mar 2024 06:50:06 GMT</pubDate>
    <dc:creator>Blason_R</dc:creator>
    <dc:date>2024-03-30T06:50:06Z</dc:date>
    <item>
      <title>CVE-2024-3094 [CRITICAL Vulnerability Just Disclosed (CVSS-10)]</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CVE-2024-3094-CRITICAL-Vulnerability-Just-Disclosed-CVSS-10/m-p/210043#M34777</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;There has been a disclosure of a significant vulnerability in the Linux liblzma library a few hours back. Due to its widespread use across various Linux distributions.&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;With a CVSS Score of 10&lt;/STRONG&gt;&lt;SPAN&gt;,&amp;nbsp;&lt;/SPAN&gt;&lt;U&gt;this vulnerability is considered highly critical.&lt;/U&gt;&lt;/P&gt;
&lt;P&gt;At least I performed quick scan through firewall appliances for version R81, 81.10 and 81.20 and it seems&amp;nbsp; xz version 5.2.5 which is not vulnerable.&lt;/P&gt;
&lt;P&gt;command to run and find out the version is from expert mode&lt;/P&gt;
&lt;P&gt;#xz -V&lt;/P&gt;
&lt;P&gt;Here are few references:&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://nvd.nist.gov/vuln/detail/CVE-2024-3094" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://nvd.nist.gov/vuln/detail/CVE-2024-3094&amp;amp;source=gmail&amp;amp;ust=1711865908023000&amp;amp;usg=AOvVaw0TnP0nwwi1_OqjwwvJfKe0"&gt;https://nvd.nist.gov/vuln/&lt;WBR /&gt;detail/CVE-2024-3094&lt;/A&gt;&lt;FONT face="tahoma, sans-serif"&gt;&lt;BR /&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;DIV class="gmail_default"&gt;&lt;A href="https://access.redhat.com/security/cve/CVE-2024-3094" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://access.redhat.com/security/cve/CVE-2024-3094&amp;amp;source=gmail&amp;amp;ust=1711865908023000&amp;amp;usg=AOvVaw2VgL4od7nh-yq8FZrq9CiD"&gt;https://access.redhat.com/&lt;WBR /&gt;security/cve/CVE-2024-3094&lt;/A&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV class="gmail_default"&gt;&lt;A href="https://www.thestack.technology/malicious-linux-backdoor-cvss-10-cve-2024-3094/" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://www.thestack.technology/malicious-linux-backdoor-cvss-10-cve-2024-3094/&amp;amp;source=gmail&amp;amp;ust=1711865908023000&amp;amp;usg=AOvVaw2brCCcxxQ4xK67z1G5G7UF"&gt;https://www.thestack.&lt;WBR /&gt;technology/malicious-linux-&lt;WBR /&gt;backdoor-cvss-10-cve-2024-&lt;WBR /&gt;3094/&lt;/A&gt;&lt;/DIV&gt;
&lt;DIV class="gmail_default"&gt;&lt;A href="https://www.cisa.gov/news-events/alerts/2024/03/29/reported-supply-chain-compromise-affecting-xz-utils-data-compression-library-cve-2024-3094" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://www.cisa.gov/news-events/alerts/2024/03/29/reported-supply-chain-compromise-affecting-xz-utils-data-compression-library-cve-2024-3094&amp;amp;source=gmail&amp;amp;ust=1711865908023000&amp;amp;usg=AOvVaw1br6rhlKnApoodTdJCWvX9"&gt;https://www.cisa.gov/news-&lt;WBR /&gt;events/alerts/2024/03/29/&lt;WBR /&gt;reported-supply-chain-&lt;WBR /&gt;compromise-affecting-xz-utils-&lt;WBR /&gt;data-compression-library-cve-&lt;WBR /&gt;2024-3094&lt;/A&gt;&lt;/DIV&gt;
&lt;DIV class="gmail_default"&gt;&lt;A href="https://www.gamingonlinux.com/2024/03/xz-tools-and-libraries-compromised-with-a-critical-issue/" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://www.gamingonlinux.com/2024/03/xz-tools-and-libraries-compromised-with-a-critical-issue/&amp;amp;source=gmail&amp;amp;ust=1711865908023000&amp;amp;usg=AOvVaw1ZidhA1FtLOyFbiCZ7xB-D"&gt;https://www.gamingonlinux.com/&lt;WBR /&gt;2024/03/xz-tools-and-&lt;WBR /&gt;libraries-compromised-with-a-&lt;WBR /&gt;critical-issue/&lt;/A&gt;&lt;/DIV&gt;</description>
      <pubDate>Sat, 30 Mar 2024 06:50:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CVE-2024-3094-CRITICAL-Vulnerability-Just-Disclosed-CVSS-10/m-p/210043#M34777</guid>
      <dc:creator>Blason_R</dc:creator>
      <dc:date>2024-03-30T06:50:06Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2024-3094 [CRITICAL Vulnerability Just Disclosed (CVSS-10)]</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CVE-2024-3094-CRITICAL-Vulnerability-Just-Disclosed-CVSS-10/m-p/210064#M34779</link>
      <description>&lt;P&gt;I see my IPS is updated in the lab, but that CVE does not show anywhwre within IPS protections.&lt;/P&gt;
&lt;P&gt;[Expert@cpazurecluster1:0]# xz -V&lt;BR /&gt;xz (XZ Utils) 5.2.2&lt;BR /&gt;liblzma 5.2.2&lt;BR /&gt;[Expert@cpazurecluster1:0]#&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Sat, 30 Mar 2024 13:30:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CVE-2024-3094-CRITICAL-Vulnerability-Just-Disclosed-CVSS-10/m-p/210064#M34779</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-03-30T13:30:53Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2024-3094 [CRITICAL Vulnerability Just Disclosed (CVSS-10)]</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CVE-2024-3094-CRITICAL-Vulnerability-Just-Disclosed-CVSS-10/m-p/210073#M34781</link>
      <description>&lt;P&gt;It has recently been released; not even 12 hours have passed.&lt;/P&gt;</description>
      <pubDate>Sat, 30 Mar 2024 15:38:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CVE-2024-3094-CRITICAL-Vulnerability-Just-Disclosed-CVSS-10/m-p/210073#M34781</guid>
      <dc:creator>Blason_R</dc:creator>
      <dc:date>2024-03-30T15:38:29Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2024-3094 [CRITICAL Vulnerability Just Disclosed (CVSS-10)]</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CVE-2024-3094-CRITICAL-Vulnerability-Just-Disclosed-CVSS-10/m-p/210074#M34782</link>
      <description>&lt;P&gt;K, got it.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Sat, 30 Mar 2024 15:39:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CVE-2024-3094-CRITICAL-Vulnerability-Just-Disclosed-CVSS-10/m-p/210074#M34782</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-03-30T15:39:41Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2024-3094 [CRITICAL Vulnerability Just Disclosed (CVSS-10)]</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CVE-2024-3094-CRITICAL-Vulnerability-Just-Disclosed-CVSS-10/m-p/210086#M34786</link>
      <description>&lt;P&gt;So far discovered Vulnerable versions are:&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Malicious code was discovered in the upstream tarballs of xz, starting with version 5.6.0.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://bugzilla.redhat.com/show_bug.cgi?id=2272210" target="_blank"&gt;2272210 – (CVE-2024-3094) CVE-2024-3094 xz: malicious code in distributed source (redhat.com)&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 31 Mar 2024 06:29:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CVE-2024-3094-CRITICAL-Vulnerability-Just-Disclosed-CVSS-10/m-p/210086#M34786</guid>
      <dc:creator>JP_Rex</dc:creator>
      <dc:date>2024-03-31T06:29:37Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2024-3094 [CRITICAL Vulnerability Just Disclosed (CVSS-10)]</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CVE-2024-3094-CRITICAL-Vulnerability-Just-Disclosed-CVSS-10/m-p/210097#M34789</link>
      <description>&lt;P&gt;Key thing here:&lt;BR /&gt;- Are Checkpoint products affected - Official statement&lt;/P&gt;
&lt;P&gt;- Have IPS signatures been updated and the default set to block.&lt;/P&gt;</description>
      <pubDate>Sun, 31 Mar 2024 10:06:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CVE-2024-3094-CRITICAL-Vulnerability-Just-Disclosed-CVSS-10/m-p/210097#M34789</guid>
      <dc:creator>genisis__</dc:creator>
      <dc:date>2024-03-31T10:06:53Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2024-3094 [CRITICAL Vulnerability Just Disclosed (CVSS-10)]</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CVE-2024-3094-CRITICAL-Vulnerability-Just-Disclosed-CVSS-10/m-p/210117#M34793</link>
      <description>&lt;P&gt;I've checked firewalls, SmartCenters, and MDSs running R81.10 and R81.20 with various jumbos (up to R81.20 jumbo 53). All had XZ Utils version 5.2.2.&lt;/P&gt;
&lt;P&gt;Only a handful of systems distributed XZ Utils 5.6.0 or 5.6.1. Most are either packaging systems mostly used by developers (such as Homebrew on macOS) or bleeding edge Linux distros (such as Debian Sid and Fedora 41 and Rawhide). This is a&amp;nbsp;&lt;STRONG&gt;&lt;EM&gt;HUGE&lt;/EM&gt;&lt;/STRONG&gt; concern for developer workstations, and you may want to treat key material held on these workstations as compromised. Might be a problem for integration testing systems, but most aren't set up to be this aggressive about testing against new versions.&lt;/P&gt;
&lt;P&gt;This exact backdoor is extremely unlikely to be a problem on production systems. It hasn't been in the code long enough. The way in which it was inserted, though, suggests well organized, patient attackers with plenty of resources (i.e, a state actor). As such, this exact backdoor is also extremely unlikely to be the only one they inserted.&lt;/P&gt;</description>
      <pubDate>Sun, 31 Mar 2024 15:04:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CVE-2024-3094-CRITICAL-Vulnerability-Just-Disclosed-CVSS-10/m-p/210117#M34793</guid>
      <dc:creator>Bob_Zimmerman</dc:creator>
      <dc:date>2024-03-31T15:04:18Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2024-3094 [CRITICAL Vulnerability Just Disclosed (CVSS-10)]</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CVE-2024-3094-CRITICAL-Vulnerability-Just-Disclosed-CVSS-10/m-p/210211#M34801</link>
      <description>&lt;P&gt;Just checked again after updating IPS manually, but still no entry for that CVE.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Mon, 01 Apr 2024 19:31:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CVE-2024-3094-CRITICAL-Vulnerability-Just-Disclosed-CVSS-10/m-p/210211#M34801</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-04-01T19:31:13Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2024-3094 [CRITICAL Vulnerability Just Disclosed (CVSS-10)]</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CVE-2024-3094-CRITICAL-Vulnerability-Just-Disclosed-CVSS-10/m-p/210224#M34805</link>
      <description>&lt;P&gt;I didn't find it either.&lt;/P&gt;</description>
      <pubDate>Mon, 01 Apr 2024 20:11:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CVE-2024-3094-CRITICAL-Vulnerability-Just-Disclosed-CVSS-10/m-p/210224#M34805</guid>
      <dc:creator>cavalli89</dc:creator>
      <dc:date>2024-04-01T20:11:18Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2024-3094 [CRITICAL Vulnerability Just Disclosed (CVSS-10)]</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CVE-2024-3094-CRITICAL-Vulnerability-Just-Disclosed-CVSS-10/m-p/210225#M34806</link>
      <description>&lt;P&gt;I looked for sk about it, but could not locate one either.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Mon, 01 Apr 2024 20:12:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CVE-2024-3094-CRITICAL-Vulnerability-Just-Disclosed-CVSS-10/m-p/210225#M34806</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-04-01T20:12:14Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2024-3094 [CRITICAL Vulnerability Just Disclosed (CVSS-10)]</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CVE-2024-3094-CRITICAL-Vulnerability-Just-Disclosed-CVSS-10/m-p/210226#M34807</link>
      <description>&lt;P&gt;Nm, just found the sk&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;
&lt;P&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk182161" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk182161&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 01 Apr 2024 20:18:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CVE-2024-3094-CRITICAL-Vulnerability-Just-Disclosed-CVSS-10/m-p/210226#M34807</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-04-01T20:18:38Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2024-3094 [CRITICAL Vulnerability Just Disclosed (CVSS-10)]</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CVE-2024-3094-CRITICAL-Vulnerability-Just-Disclosed-CVSS-10/m-p/210307#M34825</link>
      <description>&lt;P&gt;&lt;A href="https://advisories.checkpoint.com/defense/advisories/public/2024/cpai-2024-0162.html" target="_blank"&gt;CPAI-2024-0162 - Check Point Software&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 03 Apr 2024 00:15:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CVE-2024-3094-CRITICAL-Vulnerability-Just-Disclosed-CVSS-10/m-p/210307#M34825</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2024-04-03T00:15:47Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2024-3094 [CRITICAL Vulnerability Just Disclosed (CVSS-10)]</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CVE-2024-3094-CRITICAL-Vulnerability-Just-Disclosed-CVSS-10/m-p/210310#M34826</link>
      <description>&lt;P&gt;Its good does not even mention R81.20, perfect.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Wed, 03 Apr 2024 00:57:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CVE-2024-3094-CRITICAL-Vulnerability-Just-Disclosed-CVSS-10/m-p/210310#M34826</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-04-03T00:57:58Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2024-3094 [CRITICAL Vulnerability Just Disclosed (CVSS-10)]</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CVE-2024-3094-CRITICAL-Vulnerability-Just-Disclosed-CVSS-10/m-p/210323#M34828</link>
      <description>&lt;P&gt;R81.20 is a minor version in this context, the IPS protection referenced became available in package&amp;nbsp;635242217.&lt;/P&gt;</description>
      <pubDate>Wed, 03 Apr 2024 08:22:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CVE-2024-3094-CRITICAL-Vulnerability-Just-Disclosed-CVSS-10/m-p/210323#M34828</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2024-04-03T08:22:45Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2024-3094 [CRITICAL Vulnerability Just Disclosed (CVSS-10)]</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CVE-2024-3094-CRITICAL-Vulnerability-Just-Disclosed-CVSS-10/m-p/210777#M34908</link>
      <description>&lt;P&gt;There is a script to check for vulnerable versions - output on R81.20 follows:&lt;/P&gt;
&lt;LI-SPOILER&gt;
&lt;PRE&gt;&lt;FONT size="2"&gt;&lt;SPAN data-tt="{&amp;quot;paragraphStyle&amp;quot;:{&amp;quot;alignment&amp;quot;:4,&amp;quot;writingDirection&amp;quot;:1}}"&gt;#!/bin/bash &lt;/SPAN&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;SPAN data-tt="{&amp;quot;paragraphStyle&amp;quot;:{&amp;quot;alignment&amp;quot;:4,&amp;quot;writingDirection&amp;quot;:1}}"&gt;# script to detect CVE-2024-3094 &lt;/SPAN&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;SPAN data-tt="{&amp;quot;paragraphStyle&amp;quot;:{&amp;quot;alignment&amp;quot;:4,&amp;quot;writingDirection&amp;quot;:1}}"&gt;# original script: &lt;/SPAN&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;SPAN data-tt="{&amp;quot;paragraphStyle&amp;quot;:{&amp;quot;alignment&amp;quot;:4,&amp;quot;writingDirection&amp;quot;:1}}"&gt;# https://www.openwall.com/lists/oss-security/2024/03/29/4 &lt;/SPAN&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;SPAN data-tt="{&amp;quot;paragraphStyle&amp;quot;:{&amp;quot;alignment&amp;quot;:4,&amp;quot;writingDirection&amp;quot;:1}}"&gt;# modified (fixed and features added) by cyclone &lt;/SPAN&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;SPAN data-tt="{&amp;quot;paragraphStyle&amp;quot;:{&amp;quot;alignment&amp;quot;:4,&amp;quot;writingDirection&amp;quot;:1}}"&gt;# https://github.com/cyclone-github/scripts/blob/main/xz_cve-2024-3094-detect.sh &lt;/SPAN&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;SPAN data-tt="{&amp;quot;paragraphStyle&amp;quot;:{&amp;quot;alignment&amp;quot;:4,&amp;quot;writingDirection&amp;quot;:1}}"&gt;# tested on debian amd64 &lt;/SPAN&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;SPAN data-tt="{&amp;quot;paragraphStyle&amp;quot;:{&amp;quot;alignment&amp;quot;:4,&amp;quot;writingDirection&amp;quot;:1}}"&gt;# https://nvd.nist.gov/vuln/detail/CVE-2024-3094 &lt;/SPAN&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;SPAN data-tt="{&amp;quot;paragraphStyle&amp;quot;:{&amp;quot;alignment&amp;quot;:4,&amp;quot;writingDirection&amp;quot;:1}}"&gt;# https://github.com/advisories/GHSA-rxwq-x6h5-x525 &lt;/SPAN&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;SPAN data-tt="{&amp;quot;paragraphStyle&amp;quot;:{&amp;quot;alignment&amp;quot;:4,&amp;quot;writingDirection&amp;quot;:1}}"&gt;# v1.0.0; 2024-03-29 &lt;/SPAN&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;SPAN data-tt="{&amp;quot;paragraphStyle&amp;quot;:{&amp;quot;alignment&amp;quot;:4,&amp;quot;writingDirection&amp;quot;:1}}"&gt;# initial release &lt;/SPAN&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;SPAN data-tt="{&amp;quot;paragraphStyle&amp;quot;:{&amp;quot;alignment&amp;quot;:4,&amp;quot;writingDirection&amp;quot;:1}}"&gt;# v1.0.1; 2024-03-29 &lt;/SPAN&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;SPAN data-tt="{&amp;quot;paragraphStyle&amp;quot;:{&amp;quot;alignment&amp;quot;:4,&amp;quot;writingDirection&amp;quot;:1}}"&gt;# https://github.com/cyclone-github/scripts/issues/1 &lt;/SPAN&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;SPAN data-tt="{&amp;quot;paragraphStyle&amp;quot;:{&amp;quot;alignment&amp;quot;:4,&amp;quot;writingDirection&amp;quot;:1}}"&gt;# https://github.com/cyclone-github/scripts/issues/2 &lt;/SPAN&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;SPAN data-tt="{&amp;quot;paragraphStyle&amp;quot;:{&amp;quot;alignment&amp;quot;:4,&amp;quot;writingDirection&amp;quot;:1}}"&gt;# https://github.com/cyclone-github/scripts/pull/3 &lt;/SPAN&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;SPAN data-tt="{&amp;quot;paragraphStyle&amp;quot;:{&amp;quot;alignment&amp;quot;:4,&amp;quot;writingDirection&amp;quot;:1}}"&gt;# v1.0.2; 2024-03-30 &lt;/SPAN&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;SPAN data-tt="{&amp;quot;paragraphStyle&amp;quot;:{&amp;quot;alignment&amp;quot;:4,&amp;quot;writingDirection&amp;quot;:1}}"&gt;# https://github.com/cyclone-github/scripts/issues/4 &lt;/SPAN&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;SPAN data-tt="{&amp;quot;paragraphStyle&amp;quot;:{&amp;quot;alignment&amp;quot;:4,&amp;quot;writingDirection&amp;quot;:1}}"&gt;set -eu &lt;/SPAN&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;SPAN data-tt="{&amp;quot;paragraphStyle&amp;quot;:{&amp;quot;alignment&amp;quot;:4,&amp;quot;writingDirection&amp;quot;:1}}"&gt;echo "Checking system for CVE-2024-3094 Vulnerability..." &lt;/SPAN&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;SPAN data-tt="{&amp;quot;paragraphStyle&amp;quot;:{&amp;quot;alignment&amp;quot;:4,&amp;quot;writingDirection&amp;quot;:1}}"&gt;echo "https://nvd.nist.gov/vuln/detail/CVE-2024-3094" &lt;/SPAN&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;SPAN data-tt="{&amp;quot;paragraphStyle&amp;quot;:{&amp;quot;alignment&amp;quot;:4,&amp;quot;writingDirection&amp;quot;:1}}"&gt;# find path to liblzma used by sshd &lt;/SPAN&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;SPAN data-tt="{&amp;quot;paragraphStyle&amp;quot;:{&amp;quot;alignment&amp;quot;:4,&amp;quot;writingDirection&amp;quot;:1}}"&gt;# adapted from https://www.openwall.com/lists/oss-security/2024/03/29/4 &lt;/SPAN&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;SPAN data-tt="{&amp;quot;paragraphStyle&amp;quot;:{&amp;quot;alignment&amp;quot;:4,&amp;quot;writingDirection&amp;quot;:1}}"&gt;sshd_path=$(whereis -b sshd | awk '{print $2}') &lt;/SPAN&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;SPAN data-tt="{&amp;quot;paragraphStyle&amp;quot;:{&amp;quot;alignment&amp;quot;:4,&amp;quot;writingDirection&amp;quot;:1}}"&gt;path=$(ldd "$sshd_path" 2&amp;gt;/dev/null | grep -o '/.*liblzma[^ ]*' | head -1) &lt;/SPAN&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;SPAN data-tt="{&amp;quot;paragraphStyle&amp;quot;:{&amp;quot;alignment&amp;quot;:4,&amp;quot;writingDirection&amp;quot;:1}}"&gt;# or find path to liblzma used by xz &lt;/SPAN&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;SPAN data-tt="{&amp;quot;paragraphStyle&amp;quot;:{&amp;quot;alignment&amp;quot;:4,&amp;quot;writingDirection&amp;quot;:1}}"&gt;# https://github.com/cyclone-github/scripts/issues/4 &lt;/SPAN&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;SPAN data-tt="{&amp;quot;paragraphStyle&amp;quot;:{&amp;quot;alignment&amp;quot;:4,&amp;quot;writingDirection&amp;quot;:1}}"&gt;if [ -z "$path" ]; then &lt;/SPAN&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;SPAN data-tt="{&amp;quot;paragraphStyle&amp;quot;:{&amp;quot;alignment&amp;quot;:4,&amp;quot;writingDirection&amp;quot;:1}}"&gt; xz_path=$(whereis -b xz | awk '{print $2}') &lt;/SPAN&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;SPAN data-tt="{&amp;quot;paragraphStyle&amp;quot;:{&amp;quot;alignment&amp;quot;:4,&amp;quot;writingDirection&amp;quot;:1}}"&gt; path=$(ldd "$xz_path" 2&amp;gt;/dev/null | grep -o '/.*liblzma[^ ]*' | head -1) &lt;/SPAN&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;SPAN data-tt="{&amp;quot;paragraphStyle&amp;quot;:{&amp;quot;alignment&amp;quot;:4,&amp;quot;writingDirection&amp;quot;:1}}"&gt;fi &lt;/SPAN&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;SPAN data-tt="{&amp;quot;paragraphStyle&amp;quot;:{&amp;quot;alignment&amp;quot;:4,&amp;quot;writingDirection&amp;quot;:1}}"&gt;if [ -z "$path" ]; then &lt;/SPAN&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;SPAN data-tt="{&amp;quot;paragraphStyle&amp;quot;:{&amp;quot;alignment&amp;quot;:4,&amp;quot;writingDirection&amp;quot;:1}}"&gt; echo &lt;/SPAN&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;SPAN data-tt="{&amp;quot;paragraphStyle&amp;quot;:{&amp;quot;alignment&amp;quot;:4,&amp;quot;writingDirection&amp;quot;:1}}"&gt; echo "Probably not vulnerable (liblzma not found)" &lt;/SPAN&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;SPAN data-tt="{&amp;quot;paragraphStyle&amp;quot;:{&amp;quot;alignment&amp;quot;:4,&amp;quot;writingDirection&amp;quot;:1}}"&gt; exit &lt;/SPAN&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;SPAN data-tt="{&amp;quot;paragraphStyle&amp;quot;:{&amp;quot;alignment&amp;quot;:4,&amp;quot;writingDirection&amp;quot;:1}}"&gt;fi &lt;/SPAN&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;SPAN data-tt="{&amp;quot;paragraphStyle&amp;quot;:{&amp;quot;alignment&amp;quot;:4,&amp;quot;writingDirection&amp;quot;:1}}"&gt;# check for function signature &lt;/SPAN&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;SPAN data-tt="{&amp;quot;paragraphStyle&amp;quot;:{&amp;quot;alignment&amp;quot;:4,&amp;quot;writingDirection&amp;quot;:1}}"&gt;# adapted from https://www.openwall.com/lists/oss-security/2024/03/29/4 &lt;/SPAN&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;SPAN data-tt="{&amp;quot;paragraphStyle&amp;quot;:{&amp;quot;alignment&amp;quot;:4,&amp;quot;writingDirection&amp;quot;:1}}"&gt;echo &lt;/SPAN&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;SPAN data-tt="{&amp;quot;paragraphStyle&amp;quot;:{&amp;quot;alignment&amp;quot;:4,&amp;quot;writingDirection&amp;quot;:1}}"&gt;echo "Checking for function signature in liblzma..." &lt;/SPAN&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;SPAN data-tt="{&amp;quot;paragraphStyle&amp;quot;:{&amp;quot;alignment&amp;quot;:4,&amp;quot;writingDirection&amp;quot;:1}}"&gt;if hexdump -ve '1/1 "%.2x"' "$path" | grep -q 'f30f1efa554889f54c89ce5389fb81e7000000804883ec28488954241848894c2410'; then &lt;/SPAN&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;SPAN data-tt="{&amp;quot;paragraphStyle&amp;quot;:{&amp;quot;alignment&amp;quot;:4,&amp;quot;writingDirection&amp;quot;:1}}"&gt; echo "Function signature in liblzma: VULNERABLE" &lt;/SPAN&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;SPAN data-tt="{&amp;quot;paragraphStyle&amp;quot;:{&amp;quot;alignment&amp;quot;:4,&amp;quot;writingDirection&amp;quot;:1}}"&gt;else &lt;/SPAN&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;SPAN data-tt="{&amp;quot;paragraphStyle&amp;quot;:{&amp;quot;alignment&amp;quot;:4,&amp;quot;writingDirection&amp;quot;:1}}"&gt; echo "Function signature in liblzma: OK" &lt;/SPAN&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;SPAN data-tt="{&amp;quot;paragraphStyle&amp;quot;:{&amp;quot;alignment&amp;quot;:4,&amp;quot;writingDirection&amp;quot;:1}}"&gt;fi &lt;/SPAN&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;SPAN data-tt="{&amp;quot;paragraphStyle&amp;quot;:{&amp;quot;alignment&amp;quot;:4,&amp;quot;writingDirection&amp;quot;:1}}"&gt;# check xz version &lt;/SPAN&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;SPAN data-tt="{&amp;quot;paragraphStyle&amp;quot;:{&amp;quot;alignment&amp;quot;:4,&amp;quot;writingDirection&amp;quot;:1}}"&gt;echo &lt;/SPAN&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;SPAN data-tt="{&amp;quot;paragraphStyle&amp;quot;:{&amp;quot;alignment&amp;quot;:4,&amp;quot;writingDirection&amp;quot;:1}}"&gt;echo "Checking xz version..." &lt;/SPAN&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;SPAN data-tt="{&amp;quot;paragraphStyle&amp;quot;:{&amp;quot;alignment&amp;quot;:4,&amp;quot;writingDirection&amp;quot;:1}}"&gt;xz_version=$(xz --version | head -n1 | awk '{print $4}') &lt;/SPAN&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;SPAN data-tt="{&amp;quot;paragraphStyle&amp;quot;:{&amp;quot;alignment&amp;quot;:4,&amp;quot;writingDirection&amp;quot;:1}}"&gt;if [[ "$xz_version" == "5.6.0" || "$xz_version" == "5.6.1" ]]; then &lt;/SPAN&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;SPAN data-tt="{&amp;quot;paragraphStyle&amp;quot;:{&amp;quot;alignment&amp;quot;:4,&amp;quot;writingDirection&amp;quot;:1}}"&gt; echo "xz version $xz_version: VULNERABLE" &lt;/SPAN&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;SPAN data-tt="{&amp;quot;paragraphStyle&amp;quot;:{&amp;quot;alignment&amp;quot;:4,&amp;quot;writingDirection&amp;quot;:1}}"&gt;else &lt;/SPAN&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;SPAN data-tt="{&amp;quot;paragraphStyle&amp;quot;:{&amp;quot;alignment&amp;quot;:4,&amp;quot;writingDirection&amp;quot;:1}}"&gt; echo "xz version $xz_version: OK" &lt;/SPAN&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;SPAN data-tt="{&amp;quot;paragraphStyle&amp;quot;:{&amp;quot;alignment&amp;quot;:4,&amp;quot;writingDirection&amp;quot;:1}}"&gt;fi&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/PRE&gt;
&lt;/LI-SPOILER&gt;
&lt;P&gt;[Expert]# ./cvedetect.sh&lt;BR /&gt;Checking system for CVE-2024-3094 Vulnerability...&lt;BR /&gt;&lt;A href="https://nvd.nist.gov/vuln/detail/CVE-2024-3094" target="_blank"&gt;https://nvd.nist.gov/vuln/detail/CVE-2024-3094&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Checking for function signature in liblzma...&lt;BR /&gt;Function signature in liblzma: OK&lt;/P&gt;
&lt;P&gt;Checking xz version...&lt;BR /&gt;xz version 5.2.2: OK&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 09 Apr 2024 07:53:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CVE-2024-3094-CRITICAL-Vulnerability-Just-Disclosed-CVSS-10/m-p/210777#M34908</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2024-04-09T07:53:29Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2024-3094 [CRITICAL Vulnerability Just Disclosed (CVSS-10)]</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CVE-2024-3094-CRITICAL-Vulnerability-Just-Disclosed-CVSS-10/m-p/210813#M34911</link>
      <description>&lt;P&gt;I got the same in the lab fw&lt;/P&gt;
&lt;P&gt;[Expert@azurefw:0]# ./cvescript.sh&lt;BR /&gt;Checking system for CVE-2024-3094 Vulnerability...&lt;BR /&gt;&lt;A href="https://nvd.nist.gov/vuln/detail/CVE-2024-3094" target="_blank"&gt;https://nvd.nist.gov/vuln/detail/CVE-2024-3094&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Checking for function signature in liblzma...&lt;BR /&gt;Function signature in liblzma: OK&lt;/P&gt;
&lt;P&gt;Checking xz version...&lt;BR /&gt;xz version 5.2.2: OK&lt;BR /&gt;[Expert@azurefw:0]#&lt;/P&gt;</description>
      <pubDate>Tue, 09 Apr 2024 11:24:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CVE-2024-3094-CRITICAL-Vulnerability-Just-Disclosed-CVSS-10/m-p/210813#M34911</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-04-09T11:24:03Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2024-3094 [CRITICAL Vulnerability Just Disclosed (CVSS-10)]</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CVE-2024-3094-CRITICAL-Vulnerability-Just-Disclosed-CVSS-10/m-p/210816#M34912</link>
      <description>&lt;P&gt;Not a surprise at all &lt;span class="lia-unicode-emoji" title=":rolling_on_the_floor_laughing:"&gt;🤣&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 09 Apr 2024 11:26:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CVE-2024-3094-CRITICAL-Vulnerability-Just-Disclosed-CVSS-10/m-p/210816#M34912</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2024-04-09T11:26:31Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2024-3094 [CRITICAL Vulnerability Just Disclosed (CVSS-10)]</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CVE-2024-3094-CRITICAL-Vulnerability-Just-Disclosed-CVSS-10/m-p/210821#M34913</link>
      <description>&lt;P&gt;No lol&lt;/P&gt;
&lt;P&gt;I think all of them would show the same &lt;span class="lia-unicode-emoji" title=":rolling_on_the_floor_laughing:"&gt;🤣&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 09 Apr 2024 11:52:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CVE-2024-3094-CRITICAL-Vulnerability-Just-Disclosed-CVSS-10/m-p/210821#M34913</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-04-09T11:52:43Z</dc:date>
    </item>
  </channel>
</rss>

