<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: OpenSSL installed is prior to 1.0.2zf in Security</title>
    <link>https://community.splunk.com/t5/Security/OpenSSL-installed-is-prior-to-1-0-2zf/m-p/675483#M17570</link>
    <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;You should check from&amp;nbsp;&lt;A href="https://advisory.splunk.com/?301=/en_us/product-security.html" target="_blank"&gt;https://advisory.splunk.com/?301=/en_us/product-security.html&lt;/A&gt;&amp;nbsp;in which version Splunk has fixed this. Then update your environment at least to that version or even better if you could go to the latest one.&lt;/P&gt;&lt;P&gt;You could check which openssl version you have. in splunk by&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;splunk version
Splunk 9.1.2 (build b6b9c8185839)

splunk cmd openssl version
OpenSSL 1.0.2zi  1 Aug 2023&lt;/LI-CODE&gt;&lt;P&gt;This works both Splunk server and UF.&lt;/P&gt;&lt;P&gt;r. Ismo&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 26 Jan 2024 10:22:10 GMT</pubDate>
    <dc:creator>isoutamo</dc:creator>
    <dc:date>2024-01-26T10:22:10Z</dc:date>
    <item>
      <title>OpenSSL installed is prior to 1.0.2zf</title>
      <link>https://community.splunk.com/t5/Security/OpenSSL-installed-is-prior-to-1-0-2zf/m-p/675394#M17567</link>
      <description>&lt;P&gt;I have this vulnerability on all our instances on the last version of splunkforwarder&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;The version of OpenSSL installed on the remote host is prior to 1.0.2zf. It is, therefore, affected by a vulnerability as referenced in the 1.0.2zf advisory.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;BR /&gt;identified in CVE-2022-1292,&lt;BR /&gt;the OpenSSL rehash command line tool. Fixed in OpenSSL 3.0.4 (Affected 3.0.0,3.0.1,3.0.2,3.0.3). Fixed in OpenSSL 1.1.1p (Affected 1.1.1-1.1.1o). Fixed in OpenSSL 1.0.2zf (Affected 1.0.2-1.0.2ze). (CVE-2022-2068)&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;Any recommendation here&lt;/P&gt;</description>
      <pubDate>Thu, 25 Jan 2024 15:27:51 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/OpenSSL-installed-is-prior-to-1-0-2zf/m-p/675394#M17567</guid>
      <dc:creator>giangi181128</dc:creator>
      <dc:date>2024-01-25T15:27:51Z</dc:date>
    </item>
    <item>
      <title>Re: OpenSSL installed is prior to 1.0.2zf</title>
      <link>https://community.splunk.com/t5/Security/OpenSSL-installed-is-prior-to-1-0-2zf/m-p/675483#M17570</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;You should check from&amp;nbsp;&lt;A href="https://advisory.splunk.com/?301=/en_us/product-security.html" target="_blank"&gt;https://advisory.splunk.com/?301=/en_us/product-security.html&lt;/A&gt;&amp;nbsp;in which version Splunk has fixed this. Then update your environment at least to that version or even better if you could go to the latest one.&lt;/P&gt;&lt;P&gt;You could check which openssl version you have. in splunk by&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;splunk version
Splunk 9.1.2 (build b6b9c8185839)

splunk cmd openssl version
OpenSSL 1.0.2zi  1 Aug 2023&lt;/LI-CODE&gt;&lt;P&gt;This works both Splunk server and UF.&lt;/P&gt;&lt;P&gt;r. Ismo&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 26 Jan 2024 10:22:10 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/OpenSSL-installed-is-prior-to-1-0-2zf/m-p/675483#M17570</guid>
      <dc:creator>isoutamo</dc:creator>
      <dc:date>2024-01-26T10:22:10Z</dc:date>
    </item>
    <item>
      <title>Re: OpenSSL installed is prior to 1.0.2zf</title>
      <link>https://community.splunk.com/t5/Security/OpenSSL-installed-is-prior-to-1-0-2zf/m-p/675511#M17571</link>
      <description>&lt;P&gt;The recommendation would be to get a decent security team. This "finding" is completely false.&lt;/P&gt;&lt;P&gt;Firstly, the current openssl version for UF 9.1 is at least 1.0.2zg-fips.&lt;/P&gt;&lt;P&gt;Secondly, UF doesn't contain the c_rehash script so even with the "vulnerable" version the UF as a whole was not vulnerable.&lt;/P&gt;&lt;P&gt;Sending out "findings" based just on recognized versions of software is really a very low-effort vulnerability "management".&lt;/P&gt;</description>
      <pubDate>Fri, 26 Jan 2024 12:42:57 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/OpenSSL-installed-is-prior-to-1-0-2zf/m-p/675511#M17571</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2024-01-26T12:42:57Z</dc:date>
    </item>
  </channel>
</rss>

