- Products
- Learn
- Local User Groups
- Partners
-
More
Join Us for CPX 360
23-24 February 2021
Important certificate update to CloudGuard Controller, CME,
and Azure HA Security Gateways
How to Remediate Endpoint & VPN
Issues (in versions E81.10 or earlier)
IDC Spotlight -
Uplevel The SOC
Important! R80 and R80.10
End Of Support around the corner (May 2021)
We not using Checkpoint remote VPN in current setup but still we want to fix the TLS related below mentioned vulnerability.
TLS Version 1.0 and 1.1 Protocol Detection Vulnerbility.
We have VSX deployment and running r80.10 gaia os.
Also what will be the impact if we disable 1.1 and enable 1.2.
I assume the context here is sk154532 what other blades are enabled in the environment?
Can you share me the sk154532 link?
Note access to some SK articles may depend on you support/partner/certification level.
We have received report from VAPT team after rescanning the Checkpoint devices, still this Vulnerability is showing Open in the report.
TAC has shared below sk.
Kindly check sk132712, if this is relevant? (For Disabling TLS1.0 and TLS1.1)
We followed the sk147272 on both the cluster member to mitigate TLS and sweet32 vulnerabilities and re-scaned the device now we don't see this in open.
Issue resolved
About CheckMates
Learn Check Point
Advanced Learning
WELCOME TO THE FUTURE OF CYBER SECURITY