<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Is Check Point Gaia vulnerable towards this new cve-2024-6387 in OpenSSH? in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Is-Check-Point-Gaia-vulnerable-towards-this-new-cve-2024-6387-in/m-p/219531#M36593</link>
    <description>&lt;P&gt;Hi, I see this new&amp;nbsp;sk182459 CVE-2024-6387 - OpenSSH Library RCE, Sparc is not mentioned here yet. &lt;A href="https://support.checkpoint.com/results/sk/sk182459" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk182459&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 03 Jul 2024 10:22:46 GMT</pubDate>
    <dc:creator>Johan_T</dc:creator>
    <dc:date>2024-07-03T10:22:46Z</dc:date>
    <item>
      <title>Is Check Point Gaia vulnerable towards this new cve-2024-6387 in OpenSSH?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Is-Check-Point-Gaia-vulnerable-towards-this-new-cve-2024-6387-in/m-p/219265#M36534</link>
      <description>&lt;P&gt;Hi&lt;BR /&gt;&lt;BR /&gt;Is Check Point Gaia vulnerable towards this new CVE-2024-6387 in OpenSSH?&lt;/P&gt;
&lt;P&gt;Any plans to mitigate this CVE?&lt;BR /&gt;&lt;BR /&gt;Reference&lt;/P&gt;
&lt;P&gt;&lt;A href="https://thehackernews.com/2024/07/new-openssh-vulnerability-could-lead-to.html" target="_blank" rel="noopener"&gt;New OpenSSH Vulnerability Could Lead to RCE as Root on Linux Systems (thehackernews.com)&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.qualys.com/2024/07/01/cve-2024-6387/regresshion.txt?ref=upstract.com" target="_blank" rel="noopener"&gt;qualys.com/2024/07/01/cve-2024-6387/regresshion.txt?ref=upstract.com&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 01 Jul 2024 12:15:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Is-Check-Point-Gaia-vulnerable-towards-this-new-cve-2024-6387-in/m-p/219265#M36534</guid>
      <dc:creator>Kim_Moberg</dc:creator>
      <dc:date>2024-07-01T12:15:30Z</dc:date>
    </item>
    <item>
      <title>Re: Is Check Point Gaia vulnerable towards this new cve-2024-6387 in OpenSSH?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Is-Check-Point-Gaia-vulnerable-towards-this-new-cve-2024-6387-in/m-p/219271#M36535</link>
      <description>&lt;P&gt;R81.20 jumbo 65 ships with&amp;nbsp;&lt;SPAN&gt;OpenSSH_7.8p1, which is before the regression was introduced in&amp;nbsp;8.5p1. I haven't checked an R82 system yet.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 01 Jul 2024 13:34:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Is-Check-Point-Gaia-vulnerable-towards-this-new-cve-2024-6387-in/m-p/219271#M36535</guid>
      <dc:creator>Bob_Zimmerman</dc:creator>
      <dc:date>2024-07-01T13:34:49Z</dc:date>
    </item>
    <item>
      <title>Re: Is Check Point Gaia vulnerable towards this new cve-2024-6387 in OpenSSH?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Is-Check-Point-Gaia-vulnerable-towards-this-new-cve-2024-6387-in/m-p/219274#M36536</link>
      <description>&lt;P&gt;The R82 EA also ships with the same OpenSSH version as R81.20 (7.8p1).&lt;BR /&gt;Even where we shipped an older version of OpenSSH that was subject to CVE-2006-5051 (the original bug that regressed as CVE-2024-6387), we included the fix for this:&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk61744" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk61744&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Will have to double check Gaia Embedded.&lt;/P&gt;</description>
      <pubDate>Mon, 01 Jul 2024 13:57:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Is-Check-Point-Gaia-vulnerable-towards-this-new-cve-2024-6387-in/m-p/219274#M36536</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-07-01T13:57:40Z</dc:date>
    </item>
    <item>
      <title>Re: Is Check Point Gaia vulnerable towards this new cve-2024-6387 in OpenSSH?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Is-Check-Point-Gaia-vulnerable-towards-this-new-cve-2024-6387-in/m-p/219278#M36537</link>
      <description>&lt;P&gt;That brings up an interesting question. Does Gaia Embedded use glibc or musl? The vulnerability only applies to OpenSSH versions 8.5p1 and up linked against glibc, and that's not especially common in embedded systems.&lt;/P&gt;</description>
      <pubDate>Mon, 01 Jul 2024 14:13:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Is-Check-Point-Gaia-vulnerable-towards-this-new-cve-2024-6387-in/m-p/219278#M36537</guid>
      <dc:creator>Bob_Zimmerman</dc:creator>
      <dc:date>2024-07-01T14:13:52Z</dc:date>
    </item>
    <item>
      <title>Re: Is Check Point Gaia vulnerable towards this new cve-2024-6387 in OpenSSH?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Is-Check-Point-Gaia-vulnerable-towards-this-new-cve-2024-6387-in/m-p/219318#M36546</link>
      <description>&lt;P&gt;Offhand, I don't know if we use glibc or musl.&lt;BR /&gt;Prior to R80.20.60, we were using Dropbear, so this should not impact older SMB appliances.&lt;BR /&gt;As of R81.10.10, we use OpenSSH 8.5p1.&lt;/P&gt;
&lt;P&gt;In any case, I've raised the issue with the SMB team and will report back.&lt;/P&gt;</description>
      <pubDate>Mon, 01 Jul 2024 19:30:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Is-Check-Point-Gaia-vulnerable-towards-this-new-cve-2024-6387-in/m-p/219318#M36546</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-07-01T19:30:56Z</dc:date>
    </item>
    <item>
      <title>Re: Is Check Point Gaia vulnerable towards this new cve-2024-6387 in OpenSSH?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Is-Check-Point-Gaia-vulnerable-towards-this-new-cve-2024-6387-in/m-p/219338#M36552</link>
      <description>&lt;P&gt;Will wait for your next reply.&lt;BR /&gt;&lt;BR /&gt;While i'm waitng I found some commands to poke around:&lt;/P&gt;&lt;P&gt;ldd -r -v /bin/ssh : shows gblic libraries&lt;BR /&gt;rpm -q --changelog $(rpm -qa | grep openssh) | grep CVE-2006-5051 : shows&amp;nbsp;CVE-2006-5051 is still included in change logs&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk65269" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk65269&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 01 Jul 2024 23:52:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Is-Check-Point-Gaia-vulnerable-towards-this-new-cve-2024-6387-in/m-p/219338#M36552</guid>
      <dc:creator>spottex</dc:creator>
      <dc:date>2024-07-01T23:52:08Z</dc:date>
    </item>
    <item>
      <title>Re: Is Check Point Gaia vulnerable towards this new cve-2024-6387 in OpenSSH?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Is-Check-Point-Gaia-vulnerable-towards-this-new-cve-2024-6387-in/m-p/219396#M36558</link>
      <description>&lt;P&gt;Also interested in hearing about R81.10 Take 130 and above.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Maybe as&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/41139"&gt;@spottex&lt;/a&gt;&amp;nbsp;mention I can check our installation specified in the SK65269 -&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk65269" target="_blank" rel="noopener noreferrer"&gt;https://support.checkpoint.com/results/sk/sk65269&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jul 2024 12:55:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Is-Check-Point-Gaia-vulnerable-towards-this-new-cve-2024-6387-in/m-p/219396#M36558</guid>
      <dc:creator>Kim_Moberg</dc:creator>
      <dc:date>2024-07-02T12:55:02Z</dc:date>
    </item>
    <item>
      <title>Re: Is Check Point Gaia vulnerable towards this new cve-2024-6387 in OpenSSH?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Is-Check-Point-Gaia-vulnerable-towards-this-new-cve-2024-6387-in/m-p/219400#M36561</link>
      <description>&lt;P&gt;My oldest firewall still currently running is R80.40 jumbo 139. My newest is R81.20 jumbo 65. Both have OpenSSH 7.8p1, so I'd say it's reasonable to assume all the versions between them do, too.&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jul 2024 13:07:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Is-Check-Point-Gaia-vulnerable-towards-this-new-cve-2024-6387-in/m-p/219400#M36561</guid>
      <dc:creator>Bob_Zimmerman</dc:creator>
      <dc:date>2024-07-02T13:07:04Z</dc:date>
    </item>
    <item>
      <title>Re: Is Check Point Gaia vulnerable towards this new cve-2024-6387 in OpenSSH?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Is-Check-Point-Gaia-vulnerable-towards-this-new-cve-2024-6387-in/m-p/219509#M36588</link>
      <description>&lt;P&gt;Will this CVE be included in the sk65269?&lt;/P&gt;&lt;P&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk65269" target="_blank"&gt;Status of OpenSSH CVEs (checkpoint.com)&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 03 Jul 2024 07:08:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Is-Check-Point-Gaia-vulnerable-towards-this-new-cve-2024-6387-in/m-p/219509#M36588</guid>
      <dc:creator>a574591</dc:creator>
      <dc:date>2024-07-03T07:08:02Z</dc:date>
    </item>
    <item>
      <title>Re: Is Check Point Gaia vulnerable towards this new cve-2024-6387 in OpenSSH?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Is-Check-Point-Gaia-vulnerable-towards-this-new-cve-2024-6387-in/m-p/219515#M36590</link>
      <description>&lt;P&gt;I've noted in R81 with JHFA44 this also has OpenSSH_7.8p1.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 03 Jul 2024 07:21:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Is-Check-Point-Gaia-vulnerable-towards-this-new-cve-2024-6387-in/m-p/219515#M36590</guid>
      <dc:creator>genisis__</dc:creator>
      <dc:date>2024-07-03T07:21:10Z</dc:date>
    </item>
    <item>
      <title>Re: Is Check Point Gaia vulnerable towards this new cve-2024-6387 in OpenSSH?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Is-Check-Point-Gaia-vulnerable-towards-this-new-cve-2024-6387-in/m-p/219523#M36592</link>
      <description>&lt;P&gt;Yes that is a logical expectation I would say and has since been actioned.&lt;/P&gt;
&lt;P&gt;Moreover regarding general mitigations, IPS protection "Multiple SSH Initial Connection Requests" appears to have been updated.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 03 Jul 2024 12:03:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Is-Check-Point-Gaia-vulnerable-towards-this-new-cve-2024-6387-in/m-p/219523#M36592</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2024-07-03T12:03:05Z</dc:date>
    </item>
    <item>
      <title>Re: Is Check Point Gaia vulnerable towards this new cve-2024-6387 in OpenSSH?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Is-Check-Point-Gaia-vulnerable-towards-this-new-cve-2024-6387-in/m-p/219531#M36593</link>
      <description>&lt;P&gt;Hi, I see this new&amp;nbsp;sk182459 CVE-2024-6387 - OpenSSH Library RCE, Sparc is not mentioned here yet. &lt;A href="https://support.checkpoint.com/results/sk/sk182459" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk182459&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 03 Jul 2024 10:22:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Is-Check-Point-Gaia-vulnerable-towards-this-new-cve-2024-6387-in/m-p/219531#M36593</guid>
      <dc:creator>Johan_T</dc:creator>
      <dc:date>2024-07-03T10:22:46Z</dc:date>
    </item>
    <item>
      <title>Re: Is Check Point Gaia vulnerable towards this new cve-2024-6387 in OpenSSH?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Is-Check-Point-Gaia-vulnerable-towards-this-new-cve-2024-6387-in/m-p/219600#M36598</link>
      <description>&lt;P&gt;The SK is marked as internal now.&lt;BR /&gt;However, it largely says what's been discussed here.&lt;BR /&gt;A fix is planned for the relevant Quantum Spark appliances, though it is not quite as urgent since it requires some effort to exploit.&lt;BR /&gt;sshd is also not exposed to the Internet by default.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 03 Jul 2024 17:33:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Is-Check-Point-Gaia-vulnerable-towards-this-new-cve-2024-6387-in/m-p/219600#M36598</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-07-03T17:33:57Z</dc:date>
    </item>
    <item>
      <title>Re: Is Check Point Gaia vulnerable towards this new cve-2024-6387 in OpenSSH?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Is-Check-Point-Gaia-vulnerable-towards-this-new-cve-2024-6387-in/m-p/220682#M36772</link>
      <description>&lt;P&gt;For Spark , R81.10.10 is released.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk182459" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk182459&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 14 Jul 2024 17:31:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Is-Check-Point-Gaia-vulnerable-towards-this-new-cve-2024-6387-in/m-p/220682#M36772</guid>
      <dc:creator>Amir_Ayalon</dc:creator>
      <dc:date>2024-07-14T17:31:10Z</dc:date>
    </item>
    <item>
      <title>Re: Is Check Point Gaia vulnerable towards this new cve-2024-6387 in OpenSSH?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Is-Check-Point-Gaia-vulnerable-towards-this-new-cve-2024-6387-in/m-p/220739#M36777</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;under "Administrator Access", https and ssh is defined as "access for administrators"&lt;/P&gt;&lt;P&gt;For my understanding: if the gateway can be accessed by "Internet" and is secured by "specified IP addresses", is the gateway still vulnerable, if the configured IP-addresses are trusted?&lt;/P&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Screenshot of the configuration of administrator access" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/26787i57B533F83B45B491/image-size/large?v=v2&amp;amp;px=999" role="button" title="Bildschirmfoto 2024-07-15 um 11.05.19.png" alt="Screenshot of the configuration of administrator access" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Screenshot of the configuration of administrator access&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;From the logs it doesn't seem so, because all accesses from other IPs than defined, are dropped with "WebUI/SSH access attempt from unallowed source".&lt;/P&gt;&lt;P&gt;Yes I understand, that updating is the better way, but I updated all customers Sparks just one week ago with the latest update. &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance&lt;BR /&gt;Christian&lt;/P&gt;</description>
      <pubDate>Mon, 15 Jul 2024 09:13:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Is-Check-Point-Gaia-vulnerable-towards-this-new-cve-2024-6387-in/m-p/220739#M36777</guid>
      <dc:creator>Greifenstein</dc:creator>
      <dc:date>2024-07-15T09:13:16Z</dc:date>
    </item>
    <item>
      <title>Re: Is Check Point Gaia vulnerable towards this new cve-2024-6387 in OpenSSH?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Is-Check-Point-Gaia-vulnerable-towards-this-new-cve-2024-6387-in/m-p/220752#M36779</link>
      <description>&lt;P&gt;I've noted on the CP site R81.10.10 (build996002945) is the latest release however there is a new build which contains the fix "build&amp;nbsp;996002948", but under the same version release.&lt;BR /&gt;I've ping my suggest to CP ie. release this new 'fixed' version under&amp;nbsp; R81.10.11.&lt;BR /&gt;&lt;BR /&gt;For reference new build can also be found:&lt;BR /&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk182459" target="_blank" rel="noopener"&gt;https://support.checkpoint.com/results/sk/sk182459&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Even though it still references version R81.10.10&lt;/P&gt;</description>
      <pubDate>Mon, 15 Jul 2024 10:04:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Is-Check-Point-Gaia-vulnerable-towards-this-new-cve-2024-6387-in/m-p/220752#M36779</guid>
      <dc:creator>genisis__</dc:creator>
      <dc:date>2024-07-15T10:04:04Z</dc:date>
    </item>
    <item>
      <title>Re: Is Check Point Gaia vulnerable towards this new cve-2024-6387 in OpenSSH?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Is-Check-Point-Gaia-vulnerable-towards-this-new-cve-2024-6387-in/m-p/220891#M36800</link>
      <description>&lt;P&gt;This is the reason, why I doesn't show up, when looking for a Firmware Upgrade:&lt;/P&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot of Firmware Upgrade Part" style="width: 974px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/26807i06CCF5EBFFA57E22/image-size/large?v=v2&amp;amp;px=999" role="button" title="Bildschirmfoto 2024-07-16 um 08.21.22.png" alt="Screenshot of Firmware Upgrade Part" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Screenshot of Firmware Upgrade Part&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 16 Jul 2024 06:22:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Is-Check-Point-Gaia-vulnerable-towards-this-new-cve-2024-6387-in/m-p/220891#M36800</guid>
      <dc:creator>Greifenstein</dc:creator>
      <dc:date>2024-07-16T06:22:18Z</dc:date>
    </item>
    <item>
      <title>Re: Is Check Point Gaia vulnerable towards this new cve-2024-6387 in OpenSSH?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Is-Check-Point-Gaia-vulnerable-towards-this-new-cve-2024-6387-in/m-p/220900#M36805</link>
      <description>&lt;P&gt;This is what I believe as well, hence I've reported my observations to Checkpoint.&amp;nbsp; If the version was R81.10.11 as an example this would be picked up when you do a 'Check now'.&lt;/P&gt;</description>
      <pubDate>Tue, 16 Jul 2024 08:09:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Is-Check-Point-Gaia-vulnerable-towards-this-new-cve-2024-6387-in/m-p/220900#M36805</guid>
      <dc:creator>genisis__</dc:creator>
      <dc:date>2024-07-16T08:09:51Z</dc:date>
    </item>
    <item>
      <title>Re: Is Check Point Gaia vulnerable towards this new cve-2024-6387 in OpenSSH?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Is-Check-Point-Gaia-vulnerable-towards-this-new-cve-2024-6387-in/m-p/221156#M36845</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;and it was removed yesterday.&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Removed the firmware images to improve them.&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;The improved firmware images will be added soon.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;We have installed this build&amp;nbsp;&lt;SPAN&gt;996002948 on about 80% of our 1550 Firewalls and have now stopped the rollout.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;How should we proceed? Is this build unstable or critically flawed? Is a revert to build 996002945 recommended? Does the expected improved build need to be rolled out again?&lt;/P&gt;</description>
      <pubDate>Thu, 18 Jul 2024 07:37:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Is-Check-Point-Gaia-vulnerable-towards-this-new-cve-2024-6387-in/m-p/221156#M36845</guid>
      <dc:creator>Juergen_Blumens</dc:creator>
      <dc:date>2024-07-18T07:37:56Z</dc:date>
    </item>
    <item>
      <title>Re: Is Check Point Gaia vulnerable towards this new cve-2024-6387 in OpenSSH?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Is-Check-Point-Gaia-vulnerable-towards-this-new-cve-2024-6387-in/m-p/221636#M36959</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/20406"&gt;@Amir_Ayalon&lt;/a&gt;, I'm a bit confused if I need to do anything for this. Would you recommend I reach out to Support?&lt;BR /&gt;We're running R81.10 (Take 150) on 6000 appliance. I noticed the SK182459 doesn't list that appliance/platform # on the SK. OpenSSH seems to be on version 7.8p1.&amp;nbsp; I assume we're affected, but since my platform isn't on that SK, I'm don't want to risk trying the packages on that SK.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you!&lt;/P&gt;</description>
      <pubDate>Mon, 22 Jul 2024 23:41:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Is-Check-Point-Gaia-vulnerable-towards-this-new-cve-2024-6387-in/m-p/221636#M36959</guid>
      <dc:creator>r1der</dc:creator>
      <dc:date>2024-07-22T23:41:05Z</dc:date>
    </item>
  </channel>
</rss>

