<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: OpenSSH Vulnerability detection in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/OpenSSH-Vulnerability-detection/m-p/248678#M41572</link>
    <description>&lt;P&gt;In general, Check Point is very serious about product vulnerabilities. The Critical and High CVEs are fixed in a record time, especially when compared against competitors. Now, to address your questions:&lt;BR /&gt;&lt;BR /&gt;1. "Vulnerable - but not exploitable" means that although a specific component might be vulnerable to an attack, it cannot be exploited, even theoretically, as part of specific Check Point products. Usually it is the case for those parts of external libraries which are not in use, although present.&lt;/P&gt;
&lt;P&gt;If you cannot take a responsible reporting from the vendor as trusted and require additional proof, you can always request additional information via a TAC ticket or by reaching out to your local Check Point office.&lt;/P&gt;
&lt;P&gt;2. Check Point always updates or even provides custom patches for those CVEs that present a significant risk to our customers. If you are not familiar with the scoring system, &lt;A href="https://en.wikipedia.org/wiki/Common_Vulnerability_Scoring_System" target="_blank"&gt;take a look here&lt;/A&gt;; there is a decent explanation of how it is assessed.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;There is always a risk for any information or network system, it is never zero.&amp;nbsp;&lt;SPAN data-huuid="1599459801440405553"&gt;A "low risk" CVE score, generally in the range of 0.1 to 3.9, indicates a vulnerability with minimal severity.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-huuid="1599459801440407244"&gt;It means the impact on an organization's operations would be very limited at best, and most probably will just cause an inconvenience.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-huuid="1599459801440404839"&gt;Exploiting these vulnerabilities typically requires local or physical access to the system.&lt;SPAN class="pjBG2e" data-cid="cf590a28-e74a-4e54-ac48-e025ffcd5b19"&gt;&lt;SPAN class="UV3uM"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-huuid="1599459801440404839"&gt;&lt;SPAN class="pjBG2e" data-cid="cf590a28-e74a-4e54-ac48-e025ffcd5b19"&gt;&lt;SPAN class="UV3uM"&gt;In other words, having an admin password for your firewalls in the hands of a rogue admin is a higher risk than a low vulnerability&amp;nbsp; CVE. If it can only be exploited by accessing your system with an admin password, it is more a question of whether you trust your engineers and administrators.&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;I hope this makes sense. Let me know if you have more questions.&lt;BR /&gt;&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 12 May 2025 15:03:41 GMT</pubDate>
    <dc:creator>_Val_</dc:creator>
    <dc:date>2025-05-12T15:03:41Z</dc:date>
    <item>
      <title>OpenSSH Vulnerability detection</title>
      <link>https://community.checkpoint.com/t5/General-Topics/OpenSSH-Vulnerability-detection/m-p/248673#M41570</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I've been digging through information in regards to the vulnerabilities in OpenSSH that were found during our vulnerability and penetration testing.&amp;nbsp; We currently run R81.20 which has OpenSSH 7.8.&amp;nbsp; I've also been reading some of the other posts in the community.&amp;nbsp;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/General-Topics/OpenSSH-upgrade-R81-10/m-p/167999#M27914" target="_blank" rel="noopener"&gt;OpenSSH upgrade R81.10 - Check Point CheckMates&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Below OpenSSH 8.0 has the following CVE's reported.&lt;/P&gt;&lt;P&gt;CVE-2018-20685&lt;BR /&gt;CVE-2019-6109&lt;BR /&gt;CVE-2019-6110&lt;BR /&gt;CVE-2019-6111&lt;/P&gt;&lt;P&gt;Below OpenSSH 9.6 reports the follwing CVE's:&lt;/P&gt;&lt;P&gt;CVE-2023-48795&lt;BR /&gt;CVE-2023-51384&lt;BR /&gt;CVE-2023-51385&lt;/P&gt;&lt;P&gt;Now I've been reviewing SK65269&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk65269" target="_blank" rel="noopener"&gt;sk65269 - Status of OpenSSH CVEs&lt;/A&gt; and the list of OpenSSH CVE's.&amp;nbsp; CheckPoint has indicated that some of these are deemed "&lt;STRONG&gt;Vulnerable -&amp;nbsp;&lt;/STRONG&gt;but not exploitable'&lt;/P&gt;&lt;P&gt;I wanted to raise the questions&lt;/P&gt;&lt;P&gt;1.&amp;nbsp; What does "&lt;STRONG&gt;Vulnerable -&amp;nbsp;&lt;/STRONG&gt;but not exploitable" actually mean?&amp;nbsp; Does it mean that even though the version is vulnerable, it cannot be exploited?&amp;nbsp; If this is true, is there any other information or data available that supports this?&amp;nbsp; On paper, to see the word 'vulnerable' even though it's not exploitable still raises questions and concerns for the higher ups on such a vague and somewhat seemingly contradictory response.&amp;nbsp; The clarification's at the bottom do not have an explanation to this status.&lt;/P&gt;&lt;P&gt;2.&amp;nbsp; Why is Check Point not actively updating these components?&amp;nbsp; I get that some of the responses state that this is a low risk and that the odds of this ever being exploited are low, however, it has always been the practice that one of the best resolutions in cybersecurity for any vulnerability is to patch it.&amp;nbsp; Again, I understand "low risk", but it's still "risk".&amp;nbsp; Ideally we want to eliminate "risk" as much as possible.&amp;nbsp; So why can't CheckPoint include the fixed OpenSSH versions and not have this come up?&amp;nbsp; And at some point are they?&lt;/P&gt;</description>
      <pubDate>Mon, 12 May 2025 14:17:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/OpenSSH-Vulnerability-detection/m-p/248673#M41570</guid>
      <dc:creator>jberg712</dc:creator>
      <dc:date>2025-05-12T14:17:46Z</dc:date>
    </item>
    <item>
      <title>Re: OpenSSH Vulnerability detection</title>
      <link>https://community.checkpoint.com/t5/General-Topics/OpenSSH-Vulnerability-detection/m-p/248674#M41571</link>
      <description>&lt;P&gt;1) In my mind, what that really means is that something is indeed vulnerable, but way to exploit that is literally non-existent.&lt;/P&gt;
&lt;P&gt;2) I really cant answer that question, you should probably ask your local SE or open TAC case to get an official answer.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Mon, 12 May 2025 14:47:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/OpenSSH-Vulnerability-detection/m-p/248674#M41571</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-05-12T14:47:38Z</dc:date>
    </item>
    <item>
      <title>Re: OpenSSH Vulnerability detection</title>
      <link>https://community.checkpoint.com/t5/General-Topics/OpenSSH-Vulnerability-detection/m-p/248678#M41572</link>
      <description>&lt;P&gt;In general, Check Point is very serious about product vulnerabilities. The Critical and High CVEs are fixed in a record time, especially when compared against competitors. Now, to address your questions:&lt;BR /&gt;&lt;BR /&gt;1. "Vulnerable - but not exploitable" means that although a specific component might be vulnerable to an attack, it cannot be exploited, even theoretically, as part of specific Check Point products. Usually it is the case for those parts of external libraries which are not in use, although present.&lt;/P&gt;
&lt;P&gt;If you cannot take a responsible reporting from the vendor as trusted and require additional proof, you can always request additional information via a TAC ticket or by reaching out to your local Check Point office.&lt;/P&gt;
&lt;P&gt;2. Check Point always updates or even provides custom patches for those CVEs that present a significant risk to our customers. If you are not familiar with the scoring system, &lt;A href="https://en.wikipedia.org/wiki/Common_Vulnerability_Scoring_System" target="_blank"&gt;take a look here&lt;/A&gt;; there is a decent explanation of how it is assessed.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;There is always a risk for any information or network system, it is never zero.&amp;nbsp;&lt;SPAN data-huuid="1599459801440405553"&gt;A "low risk" CVE score, generally in the range of 0.1 to 3.9, indicates a vulnerability with minimal severity.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-huuid="1599459801440407244"&gt;It means the impact on an organization's operations would be very limited at best, and most probably will just cause an inconvenience.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-huuid="1599459801440404839"&gt;Exploiting these vulnerabilities typically requires local or physical access to the system.&lt;SPAN class="pjBG2e" data-cid="cf590a28-e74a-4e54-ac48-e025ffcd5b19"&gt;&lt;SPAN class="UV3uM"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-huuid="1599459801440404839"&gt;&lt;SPAN class="pjBG2e" data-cid="cf590a28-e74a-4e54-ac48-e025ffcd5b19"&gt;&lt;SPAN class="UV3uM"&gt;In other words, having an admin password for your firewalls in the hands of a rogue admin is a higher risk than a low vulnerability&amp;nbsp; CVE. If it can only be exploited by accessing your system with an admin password, it is more a question of whether you trust your engineers and administrators.&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;I hope this makes sense. Let me know if you have more questions.&lt;BR /&gt;&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 12 May 2025 15:03:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/OpenSSH-Vulnerability-detection/m-p/248678#M41572</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2025-05-12T15:03:41Z</dc:date>
    </item>
    <item>
      <title>Re: OpenSSH Vulnerability detection</title>
      <link>https://community.checkpoint.com/t5/General-Topics/OpenSSH-Vulnerability-detection/m-p/248723#M41573</link>
      <description>&lt;P&gt;Upgrading one component to a new version often requires upgrading other software components, which may create integration issues.&lt;BR /&gt;As such, if we upgrade the version of a component like OpenSSH, it's only done as part of a version upgrade.&lt;BR /&gt;Having said that, we do apply the relevant security patches to the underlying components as part of the JHF.&lt;/P&gt;</description>
      <pubDate>Mon, 12 May 2025 21:47:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/OpenSSH-Vulnerability-detection/m-p/248723#M41573</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2025-05-12T21:47:19Z</dc:date>
    </item>
    <item>
      <title>Re: OpenSSH Vulnerability detection</title>
      <link>https://community.checkpoint.com/t5/General-Topics/OpenSSH-Vulnerability-detection/m-p/248724#M41574</link>
      <description>&lt;P&gt;You got great answers by both Val and Dameon.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Mon, 12 May 2025 21:49:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/OpenSSH-Vulnerability-detection/m-p/248724#M41574</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-05-12T21:49:34Z</dc:date>
    </item>
  </channel>
</rss>

