<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic CVE-2025-32728  - permanent solution? in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/CVE-2025-32728-permanent-solution/m-p/259416#M43835</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;just stumbled over this statement in&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk183394" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk183394&lt;/A&gt;&amp;nbsp; :&lt;/P&gt;
&lt;P&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Installation of any Jumbo Hotfix Accumulator Take or upgrade to a higher version will restore the default Gaia OS configuration (will implicitly enable the parameter "&lt;CODE&gt;AllowAgentForwarding&lt;/CODE&gt;" again).&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="2"&gt;&lt;EM&gt;&lt;STRONG&gt;Therefore, you must perform this procedure again.&lt;/STRONG&gt;&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Since this a requires a lot of effort if you have a huge CP install base.&lt;/P&gt;
&lt;P&gt;Will this somehow make it into a clish config parameter and survives upgrades?&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 08 Oct 2025 11:21:52 GMT</pubDate>
    <dc:creator>S_E_</dc:creator>
    <dc:date>2025-10-08T11:21:52Z</dc:date>
    <item>
      <title>CVE-2025-32728  - permanent solution?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CVE-2025-32728-permanent-solution/m-p/259416#M43835</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;just stumbled over this statement in&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk183394" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk183394&lt;/A&gt;&amp;nbsp; :&lt;/P&gt;
&lt;P&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Installation of any Jumbo Hotfix Accumulator Take or upgrade to a higher version will restore the default Gaia OS configuration (will implicitly enable the parameter "&lt;CODE&gt;AllowAgentForwarding&lt;/CODE&gt;" again).&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="2"&gt;&lt;EM&gt;&lt;STRONG&gt;Therefore, you must perform this procedure again.&lt;/STRONG&gt;&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Since this a requires a lot of effort if you have a huge CP install base.&lt;/P&gt;
&lt;P&gt;Will this somehow make it into a clish config parameter and survives upgrades?&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Oct 2025 11:21:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CVE-2025-32728-permanent-solution/m-p/259416#M43835</guid>
      <dc:creator>S_E_</dc:creator>
      <dc:date>2025-10-08T11:21:52Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2025-32728  - permanent solution?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CVE-2025-32728-permanent-solution/m-p/259420#M43836</link>
      <description>&lt;P&gt;Excellent point there&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/5469"&gt;@S_E_&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I just checked my cluster and single gw lab and all of them show below. Cluster is R81.20 and cp-gw is R82 (all latest jumbo)&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;
&lt;P&gt;[Expert@CP-GW:0]# sshd -T -C addr=localhost | grep -i "AllowAgentForwarding"&lt;BR /&gt;allowagentforwarding yes&lt;BR /&gt;[Expert@CP-GW:0]#&lt;/P&gt;</description>
      <pubDate>Wed, 08 Oct 2025 11:55:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CVE-2025-32728-permanent-solution/m-p/259420#M43836</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-10-08T11:55:11Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2025-32728  - permanent solution?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CVE-2025-32728-permanent-solution/m-p/259435#M43837</link>
      <description>&lt;P&gt;While providing clish for said parameter is an RFE, I’m curious why we don’t fix the default sshd_config here, which seems simple enough.&lt;BR /&gt;Let me ask.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Oct 2025 13:20:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CVE-2025-32728-permanent-solution/m-p/259435#M43837</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2025-10-08T13:20:02Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2025-32728  - permanent solution?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CVE-2025-32728-permanent-solution/m-p/259474#M43838</link>
      <description>&lt;P&gt;Looks like we plan to release a fix integrated into the jumbo for this: PMTR-117744&lt;BR /&gt;It isn’t in the jumbo hotfix yet.&lt;/P&gt;</description>
      <pubDate>Wed, 08 Oct 2025 16:44:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CVE-2025-32728-permanent-solution/m-p/259474#M43838</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2025-10-08T16:44:11Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2025-32728  - permanent solution?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CVE-2025-32728-permanent-solution/m-p/259476#M43839</link>
      <description>&lt;P&gt;Yep. My company's vulnerability management team has been flagging this issue and wasting a lot of time having us "fix" it one cluster at a time only for it to be undone in our next round of jumbos. We pushed for CFG to put it in a jumbo directly.&lt;/P&gt;
&lt;P&gt;I still can't believe how much time we wasted on CVE-2023-48795 ("Terrapin"), which isn't even a vulnerability in the first place.&lt;/P&gt;</description>
      <pubDate>Wed, 08 Oct 2025 17:14:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CVE-2025-32728-permanent-solution/m-p/259476#M43839</guid>
      <dc:creator>Bob_Zimmerman</dc:creator>
      <dc:date>2025-10-08T17:14:43Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2025-32728  - permanent solution?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CVE-2025-32728-permanent-solution/m-p/259477#M43840</link>
      <description>&lt;P&gt;Good news!&lt;/P&gt;</description>
      <pubDate>Wed, 08 Oct 2025 17:20:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CVE-2025-32728-permanent-solution/m-p/259477#M43840</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-10-08T17:20:29Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2025-32728  - permanent solution?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CVE-2025-32728-permanent-solution/m-p/259513#M43841</link>
      <description>&lt;P&gt;Sounds good. Thanks.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 09 Oct 2025 05:40:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CVE-2025-32728-permanent-solution/m-p/259513#M43841</guid>
      <dc:creator>S_E_</dc:creator>
      <dc:date>2025-10-09T05:40:52Z</dc:date>
    </item>
  </channel>
</rss>

