<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: CVE-2026-43284 and CVE-2026-43500 in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/CVE-2026-43284-and-CVE-2026-43500/m-p/276734#M46159</link>
    <description>&lt;P&gt;esp4 and esp6 modules are present on R81.20, R82, and R82.10. They aren't loaded on any of the firewalls I've checked, even ones which terminate VPNs, so Check Point appears to only use their own IPSec stack.&lt;/P&gt;
&lt;P&gt;rxrpc is present only on R82.10. It isn't loaded on any system I've checked (admittedly, not many).&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;From the outside&lt;/STRONG&gt;, both appear to be non-issues on Check Point systems.&lt;/P&gt;</description>
    <pubDate>Fri, 08 May 2026 21:01:17 GMT</pubDate>
    <dc:creator>Bob_Zimmerman</dc:creator>
    <dc:date>2026-05-08T21:01:17Z</dc:date>
    <item>
      <title>CVE-2026-43284 and CVE-2026-43500</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CVE-2026-43284-and-CVE-2026-43500/m-p/276718#M46156</link>
      <description>&lt;P&gt;I see the official announcement for the CVE-2026-31431 (sk184928), but this one is fairly different and quite new.&amp;nbsp; What would be the expected impacts for&amp;nbsp;CVE-2026-43284 and CVE-2026-43500 on R81.20, R82 and R82.10 as we have all 3 in our environment.&lt;/P&gt;</description>
      <pubDate>Fri, 08 May 2026 17:14:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CVE-2026-43284-and-CVE-2026-43500/m-p/276718#M46156</guid>
      <dc:creator>mbrock</dc:creator>
      <dc:date>2026-05-08T17:14:29Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2026-43284 and CVE-2026-43500</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CVE-2026-43284-and-CVE-2026-43500/m-p/276734#M46159</link>
      <description>&lt;P&gt;esp4 and esp6 modules are present on R81.20, R82, and R82.10. They aren't loaded on any of the firewalls I've checked, even ones which terminate VPNs, so Check Point appears to only use their own IPSec stack.&lt;/P&gt;
&lt;P&gt;rxrpc is present only on R82.10. It isn't loaded on any system I've checked (admittedly, not many).&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;From the outside&lt;/STRONG&gt;, both appear to be non-issues on Check Point systems.&lt;/P&gt;</description>
      <pubDate>Fri, 08 May 2026 21:01:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CVE-2026-43284-and-CVE-2026-43500/m-p/276734#M46159</guid>
      <dc:creator>Bob_Zimmerman</dc:creator>
      <dc:date>2026-05-08T21:01:17Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2026-43284 and CVE-2026-43500</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CVE-2026-43284-and-CVE-2026-43500/m-p/276735#M46160</link>
      <description>&lt;P&gt;CVE-2026-43500 looks like another local privilege escalation bug.&lt;BR /&gt;These are not relevant on Gaia OS since you need expert access to exploit them and expert IS root.&lt;/P&gt;
&lt;P&gt;For the other CVE, not sure.&lt;BR /&gt;In either case, TAC will need to be consulted for an official answer.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 08 May 2026 21:09:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CVE-2026-43284-and-CVE-2026-43500/m-p/276735#M46160</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2026-05-08T21:09:35Z</dc:date>
    </item>
  </channel>
</rss>

