<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic CodeMeter protected application error &amp;quot;JVMTI&amp;quot; when using Cortex XDR in Cortex XDR Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/codemeter-protected-application-error-quot-jvmti-quot-when-using/m-p/512661#M2673</link>
    <description>&lt;P&gt;The Java Application i am developing is using WIBU CodeMeter Software to prevent Hacker attacks.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.wibu.com/us/products/codemeter.html" target="_blank" rel="noopener"&gt;CodeMeter from Wibu-Systems: Secure protection &amp;amp; license management of software and digital content: Wibu-Systems&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Currently we protect the application, so that no one can establish a Debug Connection with the JavaVM to be able to read/change values hold in memory.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;CodeMeter is using the JVMTI interface for blocking these kind of attacks.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We have released an application 3 years ago and it always worked, but since 2 weeks the same application can not be started anymore, after Cortex XDR was updated.&lt;/P&gt;
&lt;P&gt;It seems that the Cortex XDR Virus Scanner is also trying to use the JVMTI interface and because 2 application trying to "manipulate" my application the application breaks.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Do you now an option/configuration/module which i can de-activate in CortexXDR to prevent the JVMTI usage?&lt;/LI&gt;
&lt;LI&gt;Is there something like an "Injection-Module" which can be de-activated for java.exe applications?&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 23 Aug 2022 13:33:44 GMT</pubDate>
    <dc:creator>MarkusL</dc:creator>
    <dc:date>2022-08-23T13:33:44Z</dc:date>
    <item>
      <title>CodeMeter protected application error "JVMTI" when using Cortex XDR</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/codemeter-protected-application-error-quot-jvmti-quot-when-using/m-p/512661#M2673</link>
      <description>&lt;P&gt;The Java Application i am developing is using WIBU CodeMeter Software to prevent Hacker attacks.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.wibu.com/us/products/codemeter.html" target="_blank" rel="noopener"&gt;CodeMeter from Wibu-Systems: Secure protection &amp;amp; license management of software and digital content: Wibu-Systems&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Currently we protect the application, so that no one can establish a Debug Connection with the JavaVM to be able to read/change values hold in memory.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;CodeMeter is using the JVMTI interface for blocking these kind of attacks.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We have released an application 3 years ago and it always worked, but since 2 weeks the same application can not be started anymore, after Cortex XDR was updated.&lt;/P&gt;
&lt;P&gt;It seems that the Cortex XDR Virus Scanner is also trying to use the JVMTI interface and because 2 application trying to "manipulate" my application the application breaks.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Do you now an option/configuration/module which i can de-activate in CortexXDR to prevent the JVMTI usage?&lt;/LI&gt;
&lt;LI&gt;Is there something like an "Injection-Module" which can be de-activated for java.exe applications?&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 23 Aug 2022 13:33:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/codemeter-protected-application-error-quot-jvmti-quot-when-using/m-p/512661#M2673</guid>
      <dc:creator>MarkusL</dc:creator>
      <dc:date>2022-08-23T13:33:44Z</dc:date>
    </item>
    <item>
      <title>Re: CodeMeter protected application error "JVMTI" when using Cortex XDR</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/codemeter-protected-application-error-quot-jvmti-quot-when-using/m-p/512838#M2682</link>
      <description>&lt;P&gt;Hi MarkusL,&lt;BR /&gt;&lt;BR /&gt;Yes, for this you will need to navigate to your Exploit Protection Profiles and under the "Known Vulnerable Processes Protection" module you will see "Java Deserialization Protection" with a default setting of "Enabled". By disabling that specific protection for the effected hosts I believe your issue will be resolved.&lt;/P&gt;</description>
      <pubDate>Wed, 24 Aug 2022 13:32:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/codemeter-protected-application-error-quot-jvmti-quot-when-using/m-p/512838#M2682</guid>
      <dc:creator>bbucao</dc:creator>
      <dc:date>2022-08-24T13:32:44Z</dc:date>
    </item>
  </channel>
</rss>

