<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Java Deserialization Protection in Cortex XDR Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/java-deserialization-protection/m-p/480764#M1878</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I am looking to enable the "&lt;SPAN&gt;Java Deserialization Protection" in my exploit profile.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I see the default is to leave it disabled.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;anyone else have this enabled?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;any advise or experience working with this?&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 18 Apr 2022 17:00:50 GMT</pubDate>
    <dc:creator>P.Jacob</dc:creator>
    <dc:date>2022-04-18T17:00:50Z</dc:date>
    <item>
      <title>Java Deserialization Protection</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/java-deserialization-protection/m-p/480764#M1878</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I am looking to enable the "&lt;SPAN&gt;Java Deserialization Protection" in my exploit profile.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I see the default is to leave it disabled.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;anyone else have this enabled?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;any advise or experience working with this?&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 18 Apr 2022 17:00:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/java-deserialization-protection/m-p/480764#M1878</guid>
      <dc:creator>P.Jacob</dc:creator>
      <dc:date>2022-04-18T17:00:50Z</dc:date>
    </item>
    <item>
      <title>Re: Java Deserialization Protection</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/java-deserialization-protection/m-p/480775#M1879</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/97798"&gt;@P.Jacob&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;Im not sure if your post is because your organization works with Spring Framework which is affected as you know by a recent reported vulnerability (see&amp;nbsp; &lt;A href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22965" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;CVE-2022-22965&lt;/SPAN&gt;&lt;/A&gt;&amp;nbsp;for more information).&amp;nbsp;&lt;/P&gt;&lt;P&gt;If possitive to the former, we at PANW&amp;nbsp; highly recommend to upgrade your spring framework to the release/s &lt;SPAN&gt;5.3.18 and 5.2.20 and also your Cortex XDR agents to the latest release, and more specifically to release 7.7and content above&amp;nbsp;470-88704.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If somebody tries to exploit this vulnerability , it will be blocked by the Java Deserialization Exploit protection module, which will be active if you enable Known Vulnerable Processes Protection at the Linux Exploit Security profile.&lt;/P&gt;&lt;P&gt;Please check that&amp;nbsp; "Known Vulnerable Processes Protection" module is set to block, so that exploitation attempt is blocked and you will get an alert&amp;nbsp; of the type Suspicious Input Deserialization.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope this helps,&amp;nbsp;&lt;/P&gt;&lt;P&gt;Luis&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 18 Apr 2022 17:52:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/java-deserialization-protection/m-p/480775#M1879</guid>
      <dc:creator>eluis</dc:creator>
      <dc:date>2022-04-18T17:52:50Z</dc:date>
    </item>
    <item>
      <title>Re: Java Deserialization Protection</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/java-deserialization-protection/m-p/481166#M1889</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/190764"&gt;@eluis&lt;/a&gt;&amp;nbsp;thanks for the reply back man! I was just thinking that if its an available option now for windows if it would be good to enable it... I have read up on what it is but don't really understand fully what it is and what it does. I think for now I will just work on the "OpenSSL Infinite Loop Vulnerability" and put this on the back burner.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 19 Apr 2022 23:46:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/java-deserialization-protection/m-p/481166#M1889</guid>
      <dc:creator>P.Jacob</dc:creator>
      <dc:date>2022-04-19T23:46:04Z</dc:date>
    </item>
    <item>
      <title>Re: Java Deserialization Protection</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/java-deserialization-protection/m-p/481182#M1891</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/97798"&gt;@P.Jacob&lt;/a&gt;&amp;nbsp;If you have Java application using spring framework, i would assume it will be good to turn on this policy on your test system and work from there to implement to your live systems.&lt;/P&gt;</description>
      <pubDate>Wed, 20 Apr 2022 00:37:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/java-deserialization-protection/m-p/481182#M1891</guid>
      <dc:creator>KanwarSingh01</dc:creator>
      <dc:date>2022-04-20T00:37:12Z</dc:date>
    </item>
  </channel>
</rss>

