<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: openssh/openssl in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/openssh-openssl/m-p/241161#M40242</link>
    <description>&lt;P&gt;If you look at the CVSS scores for the CVEs, they rate between 3.1 and 5.3 (out of 10).&lt;BR /&gt;At best they are "low to medium" severity CVEs that require&amp;nbsp;a privileged user on the platform to access a malicious SCP server to be exploited.&lt;BR /&gt;This is likely why we have made the determination this is relatively low risk.&lt;/P&gt;
&lt;P&gt;I assume we will fix this once the underlying component is updated to a different version, which most likely won't happen outside of a new release.&lt;/P&gt;</description>
    <pubDate>Thu, 13 Feb 2025 23:48:01 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2025-02-13T23:48:01Z</dc:date>
    <item>
      <title>openssh/openssl</title>
      <link>https://community.checkpoint.com/t5/General-Topics/openssh-openssl/m-p/221212#M36865</link>
      <description>&lt;P&gt;Hello mates,&lt;/P&gt;&lt;P&gt;The current version of OpenSSH and OpenSSL on R81.20 is OpenSSH 7.8p1 and OpenSSL 1.1.1w. According to the Vulnerability Assessment reports, these versions are flagged as having vulnerabilities. What are the latest compatible versions ?&lt;/P&gt;</description>
      <pubDate>Thu, 18 Jul 2024 14:04:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/openssh-openssl/m-p/221212#M36865</guid>
      <dc:creator>Naana</dc:creator>
      <dc:date>2024-07-18T14:04:31Z</dc:date>
    </item>
    <item>
      <title>Re: openssh/openssl</title>
      <link>https://community.checkpoint.com/t5/General-Topics/openssh-openssl/m-p/221264#M36894</link>
      <description>&lt;P&gt;These components should be patched against the relevant CVEs.&lt;BR /&gt;See the following SKs:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Status of OpenSSL CVEs:&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk92447" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk92447&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Status of OpenSSH CVEs:&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk65269" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk65269&lt;/A&gt;&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Thu, 18 Jul 2024 16:45:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/openssh-openssl/m-p/221264#M36894</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-07-18T16:45:47Z</dc:date>
    </item>
    <item>
      <title>Re: openssh/openssl</title>
      <link>https://community.checkpoint.com/t5/General-Topics/openssh-openssl/m-p/241064#M40222</link>
      <description>&lt;P&gt;We are running R82 with JHFA10 and when we ran a scan against this, was surprised it picked up OpenSSH CVE's from 2018, and 2019 (They are listed in SK65269).&lt;/P&gt;
&lt;P&gt;I raised a TAC case and was told this is not a TAC issue.&amp;nbsp; Well CVE's from 2018/2019 on the latest build..hmm I don't think there is an excuse as to why OpenSSH has not been updated to resolve these issues, any chance we can get an update as to when OpenSSH is going to be updated to non-vulnerable version?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 12 Feb 2025 22:25:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/openssh-openssl/m-p/241064#M40222</guid>
      <dc:creator>genisis__</dc:creator>
      <dc:date>2025-02-12T22:25:46Z</dc:date>
    </item>
    <item>
      <title>Re: openssh/openssl</title>
      <link>https://community.checkpoint.com/t5/General-Topics/openssh-openssl/m-p/241096#M40227</link>
      <description>&lt;P&gt;That's more an issue with vulnerability scanners being terrible wastes of money.&amp;nbsp;&lt;span class="lia-unicode-emoji" title=":winking_face_with_tongue:"&gt;😜&lt;/span&gt;&amp;nbsp;I keep getting scan results saying systems are vulnerable to CVE-2023-48795, which is categorically not a vulnerability on versions of OpenSSH before 9.5. They basically look at the version in the service banner, ignore it, and report every CVE which has ever existed for the application, no matter whether it represents an actual vulnerability in that environment or not.&lt;/P&gt;</description>
      <pubDate>Thu, 13 Feb 2025 06:34:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/openssh-openssl/m-p/241096#M40227</guid>
      <dc:creator>Bob_Zimmerman</dc:creator>
      <dc:date>2025-02-13T06:34:43Z</dc:date>
    </item>
    <item>
      <title>Re: openssh/openssl</title>
      <link>https://community.checkpoint.com/t5/General-Topics/openssh-openssl/m-p/241102#M40230</link>
      <description>&lt;P&gt;I agree - pen test reports never seem to actually indicate what was required in order to actually get to the point they could scan the device.&lt;BR /&gt;So it could be a critical vulnerability but the probability of exploit is low due to the layer of security that had to be bypassed in order to reach that point.&lt;BR /&gt;&lt;BR /&gt;That said my comments are coming from the fact the SK from Checkpoint indicates the issue has not been fixed because they believe its a low priority (since 2019!).&lt;/P&gt;</description>
      <pubDate>Thu, 13 Feb 2025 09:31:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/openssh-openssl/m-p/241102#M40230</guid>
      <dc:creator>genisis__</dc:creator>
      <dc:date>2025-02-13T09:31:29Z</dc:date>
    </item>
    <item>
      <title>Re: openssh/openssl</title>
      <link>https://community.checkpoint.com/t5/General-Topics/openssh-openssl/m-p/241161#M40242</link>
      <description>&lt;P&gt;If you look at the CVSS scores for the CVEs, they rate between 3.1 and 5.3 (out of 10).&lt;BR /&gt;At best they are "low to medium" severity CVEs that require&amp;nbsp;a privileged user on the platform to access a malicious SCP server to be exploited.&lt;BR /&gt;This is likely why we have made the determination this is relatively low risk.&lt;/P&gt;
&lt;P&gt;I assume we will fix this once the underlying component is updated to a different version, which most likely won't happen outside of a new release.&lt;/P&gt;</description>
      <pubDate>Thu, 13 Feb 2025 23:48:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/openssh-openssl/m-p/241161#M40242</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2025-02-13T23:48:01Z</dc:date>
    </item>
    <item>
      <title>Re: openssh/openssl</title>
      <link>https://community.checkpoint.com/t5/General-Topics/openssh-openssl/m-p/241211#M40248</link>
      <description>&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Fri, 14 Feb 2025 13:51:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/openssh-openssl/m-p/241211#M40248</guid>
      <dc:creator>genisis__</dc:creator>
      <dc:date>2025-02-14T13:51:22Z</dc:date>
    </item>
  </channel>
</rss>

