<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Vulnerabilities detected by VA scan in Spark Firewall (SMB)</title>
    <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Vulnerabilities-detected-by-VA-scan/m-p/202042#M10065</link>
    <description>&lt;P&gt;check this&lt;/P&gt;
&lt;P&gt;Expert# cpwd_admin list&lt;BR /&gt;APP PID STAT #START START_TIME MON COMMAND&lt;BR /&gt;SSHD 3554 E 1 [13:26:19] 3/12/2023 N /pfrm2.0/bin/sshd -f /pfrm2.0/etc/sshd_config&lt;/P&gt;</description>
    <pubDate>Wed, 03 Jan 2024 10:26:36 GMT</pubDate>
    <dc:creator>Martin_Valenta</dc:creator>
    <dc:date>2024-01-03T10:26:36Z</dc:date>
    <item>
      <title>Vulnerabilities detected by VA scan</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Vulnerabilities-detected-by-VA-scan/m-p/202041#M10064</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Hi All,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Recently we did a VA scan on one of our SMB device and there is one vulnerabilities listed below:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;"Diffie-Hellman Ephemeral Key Exchange DoS Vulnerability (SSH, D(HE)ater) (CVSS: 7.5)"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;I did not found any related fix on the SK but I went on some research, it seems like need to disable the Diffie-Hellman Key exchange method in the file name "sshd_config".&lt;/P&gt;&lt;P&gt;For normal appliance the path for "sshd_config" file will be /etc/ssh/sshd_config&lt;/P&gt;&lt;P&gt;But for SMB, screenshot below is what I got when trying to find the file:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2024-01-03 181723.png" style="width: 807px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23898i1E7E730D3B6EC522/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot 2024-01-03 181723.png" alt="Screenshot 2024-01-03 181723.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;It seems like the "ssh" has a symbolic link to "/var/ssh/" but the "ssh" folder is not in the "/var".&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Does anyone has any idea on this?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Appreciate for the help!&lt;/P&gt;</description>
      <pubDate>Wed, 03 Jan 2024 10:24:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Vulnerabilities-detected-by-VA-scan/m-p/202041#M10064</guid>
      <dc:creator>BigHec</dc:creator>
      <dc:date>2024-01-03T10:24:03Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerabilities detected by VA scan</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Vulnerabilities-detected-by-VA-scan/m-p/202042#M10065</link>
      <description>&lt;P&gt;check this&lt;/P&gt;
&lt;P&gt;Expert# cpwd_admin list&lt;BR /&gt;APP PID STAT #START START_TIME MON COMMAND&lt;BR /&gt;SSHD 3554 E 1 [13:26:19] 3/12/2023 N /pfrm2.0/bin/sshd -f /pfrm2.0/etc/sshd_config&lt;/P&gt;</description>
      <pubDate>Wed, 03 Jan 2024 10:26:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Vulnerabilities-detected-by-VA-scan/m-p/202042#M10065</guid>
      <dc:creator>Martin_Valenta</dc:creator>
      <dc:date>2024-01-03T10:26:36Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerabilities detected by VA scan</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Vulnerabilities-detected-by-VA-scan/m-p/202068#M10069</link>
      <description>&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;Hi Martin,&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2024-01-03 181723.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23900i101FA923EB83446A/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot 2024-01-03 181723.png" alt="Screenshot 2024-01-03 181723.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;This is all I'm able to see when running cpwd_admin list command&lt;/P&gt;</description>
      <pubDate>Wed, 03 Jan 2024 13:44:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Vulnerabilities-detected-by-VA-scan/m-p/202068#M10069</guid>
      <dc:creator>BigHec</dc:creator>
      <dc:date>2024-01-03T13:44:51Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerabilities detected by VA scan</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Vulnerabilities-detected-by-VA-scan/m-p/202086#M10070</link>
      <description>&lt;P&gt;Only in the most recent SMB firmware releases (R81.10.xx) is OpenSSH used.&lt;BR /&gt;In other releases, Dropbear is used as the SSH daemon, which means the procedure for remediating this would be different (assuming it's even possible to do so).&lt;BR /&gt;In our official SK, SMB appliances aren't mentioned at all:&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk181833" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk181833&lt;/A&gt;&lt;BR /&gt;In any case, please open a TAC case: &lt;A href="https://help.checkpoint.com" target="_blank"&gt;https://help.checkpoint.com&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/20406"&gt;@Amir_Ayalon&lt;/a&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 03 Jan 2024 15:13:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Vulnerabilities-detected-by-VA-scan/m-p/202086#M10070</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-01-03T15:13:39Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerabilities detected by VA scan</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Vulnerabilities-detected-by-VA-scan/m-p/202144#M10071</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/7"&gt;@PhoneBoy&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;We did checked the SMB firmware is installed with version R81.10.00.&lt;/P&gt;&lt;P&gt;I think I will proceed to open a TAC case for this&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;</description>
      <pubDate>Thu, 04 Jan 2024 01:26:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Vulnerabilities-detected-by-VA-scan/m-p/202144#M10071</guid>
      <dc:creator>BigHec</dc:creator>
      <dc:date>2024-01-04T01:26:42Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerabilities detected by VA scan</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Vulnerabilities-detected-by-VA-scan/m-p/202577#M10076</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;Do anyone knows how to restart the SSHD service in a SMB device? Because I did some changes on the sshd file and I wanted to restart the service and try will the file take effect or not&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks alot!&lt;/P&gt;</description>
      <pubDate>Tue, 09 Jan 2024 07:54:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Vulnerabilities-detected-by-VA-scan/m-p/202577#M10076</guid>
      <dc:creator>BigHec</dc:creator>
      <dc:date>2024-01-09T07:54:34Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerabilities detected by VA scan</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Vulnerabilities-detected-by-VA-scan/m-p/202601#M10078</link>
      <description>&lt;P&gt;There is a supported way to configure this for SMB since 81.10.05:&lt;/P&gt;
&lt;P&gt;&lt;LI-WRAPPER&gt;&lt;/LI-WRAPPER&gt;&lt;/P&gt;
&lt;PRE&gt;&lt;SPAN class="ansi0 bgAnsi15"&gt;[Expert@fifteenfifty]# clish&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN class="ansi0 bgAnsi15"&gt;fifteenfifty&amp;gt; show ssh-&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN class="ansi0 bgAnsi15"&gt;ssh-cipher - OpenSSH Cipher encryption&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN class="ansi0 bgAnsi15"&gt;ssh-kex - OpenSSH KEX encryption&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN class="ansi0 bgAnsi15"&gt;ssh-mac - OpenSSH MAC encryption&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN class="ansi0 bgAnsi15"&gt;fifteenfifty&amp;gt; show ssh-cipher &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN class="ansi0 bgAnsi15"&gt;aes128-ctr&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN class="ansi0 bgAnsi15"&gt;aes192-ctr&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN class="ansi0 bgAnsi15"&gt;aes256-ctr&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN class="ansi0 bgAnsi15"&gt;fifteenfifty&amp;gt; show ssh-mac &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN class="ansi0 bgAnsi15"&gt;hmac-sha1&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN class="ansi0 bgAnsi15"&gt;hmac-sha2-256&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN class="ansi0 bgAnsi15"&gt;hmac-sha2-512&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN class="ansi0 bgAnsi15"&gt;fifteenfifty&amp;gt; show ssh-kex &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN class="ansi0 bgAnsi15"&gt;curve25519-sha256&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN class="ansi0 bgAnsi15"&gt;curve25519-sha256@libssh.org&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN class="ansi0 bgAnsi15"&gt;ecdh-sha2-nistp521&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN class="ansi0 bgAnsi15"&gt;ecdh-sha2-nistp384&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN class="ansi0 bgAnsi15"&gt;ecdh-sha2-nistp256&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN class="ansi0 bgAnsi15"&gt;diffie-hellman-group14-sha256&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN class="ansi0 bgAnsi15"&gt;diffie-hellman-group14-sha1&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN class="ansi0 bgAnsi15"&gt;diffie-hellman-group16-sha512&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN class="ansi0 bgAnsi15"&gt;diffie-hellman-group18-sha512&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN class="ansi0 bgAnsi15"&gt;diffie-hellman-group-exchange-sha256&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;P&gt;&lt;CODE&gt;delete ssh-&amp;lt;&lt;EM&gt;encryption-category&lt;/EM&gt;&amp;gt; algorithm &amp;lt;&lt;EM&gt;algorithm&lt;/EM&gt;&amp;gt;&lt;/CODE&gt;&lt;/P&gt;
&lt;P class="Procedure_Heading"&gt;Example:&lt;/P&gt;
&lt;TABLE class="TableStyle-TP_Table_Code" style="mc-table-style: url('../Resources/TableStyles/TP_Table_Code.css');" cellspacing="0"&gt;&lt;COLGROUP&gt;&lt;COL /&gt; &lt;/COLGROUP&gt;
&lt;TBODY&gt;
&lt;TR class="TableStyle-TP_Table_Code-Body-Body1"&gt;
&lt;TD class="TableStyle-TP_Table_Code-BodyA--Body1"&gt;
&lt;P&gt;&lt;CODE&gt;delete ssh-cipher algorithm aes128-cbc&lt;/CODE&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://sc1.checkpoint.com/documents/SMB_R81.10.X/CLI/EN/Content/Topics/delete-ssh-encryption-category-algorithm.htm?tocpath=Working%20with%20OpenSSH%20Encryption%20Algorithms%7C_____2" target="_blank" rel="noopener"&gt;https://sc1.checkpoint.com/documents/SMB_R81.10.X/CLI/EN/Content/Topics/delete-ssh-encryption-category-algorithm.htm?tocpath=Working%20with%20OpenSSH%20Encryption%20Algorithms%7C_____2&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;In lower firmware version there is no possibility to exclude a cipher, MAC or KEX as it uses &lt;A title="dropbear" href="https://matt.ucc.asn.au/dropbear/dropbear.html" target="_blank" rel="noopener"&gt;&lt;EM&gt;dropbear&lt;/EM&gt;&lt;/A&gt; created for embedded devices...&lt;/P&gt;</description>
      <pubDate>Tue, 09 Jan 2024 15:42:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Vulnerabilities-detected-by-VA-scan/m-p/202601#M10078</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2024-01-09T15:42:09Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerabilities detected by VA scan</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Vulnerabilities-detected-by-VA-scan/m-p/202654#M10088</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/21294"&gt;@G_W_Albrecht&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;This is what I'm looking for. Thank you so much on this.&lt;/P&gt;&lt;P&gt;And I have another thing is that the vulnerability tools also scanned vulnerability related to the CVE-2023-48795 on port 22, which is the "chacha20-poly1305" cipher.&lt;/P&gt;&lt;P&gt;Is the cipher need to disable by using the "cipher_util"? Because I can't seems to find it when using the "show ssh-cipher" command when list out all the ciphers for the SMB device.&lt;/P&gt;&lt;P&gt;Found the sk181833 but I think it is for Enterprise appliances and it did not officially mention it is applicable for SMB device.&lt;/P&gt;&lt;P&gt;Any idea on this?&lt;/P&gt;&lt;P&gt;Appreciate for the help.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 10 Jan 2024 03:30:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Vulnerabilities-detected-by-VA-scan/m-p/202654#M10088</guid>
      <dc:creator>BigHec</dc:creator>
      <dc:date>2024-01-10T03:30:57Z</dc:date>
    </item>
  </channel>
</rss>

