<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cortex XDR PoC Lab ft. CVE-2021-3560 in Cortex XDR Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-poc-lab-ft-cve-2021-3560/m-p/515041#M2825</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/223246"&gt;@mfakhouri&lt;/a&gt; Great write up. Really appreciate the time you have spent on this.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;Kanwar&lt;/P&gt;</description>
    <pubDate>Fri, 16 Sep 2022 04:29:07 GMT</pubDate>
    <dc:creator>KanwarSingh01</dc:creator>
    <dc:date>2022-09-16T04:29:07Z</dc:date>
    <item>
      <title>Cortex XDR PoC Lab ft. CVE-2021-3560</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-poc-lab-ft-cve-2021-3560/m-p/513649#M2748</link>
      <description>&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="CortexLogo.PNG" style="width: 777px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/43556i21CB1DEC474A21F8/image-dimensions/777x169/is-moderation-mode/true?v=v2" width="777" height="169" role="button" title="CortexLogo.PNG" alt="CortexLogo.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt; &lt;/P&gt;
&lt;P class=""&gt;&lt;FONT size="5"&gt;&lt;FONT face="times new roman,times"&gt;&lt;SPAN class=""&gt;PoC Lab&lt;SPAN class=""&gt;&amp;nbsp;&lt;SPAN class=""&gt;ft. CVE-2021-3560&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class=""&gt;&lt;FONT size="4"&gt;&lt;FONT face="times new roman,times"&gt;&lt;SPAN class=""&gt;By: &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/223246"&gt;@mfakhouri&lt;/a&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;HR /&gt;
&lt;H1&gt;&amp;nbsp;&lt;/H1&gt;
&lt;H1&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;&lt;SPAN class=""&gt;Table Of Contents&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H1&gt;
&lt;HR /&gt;
&lt;P class="" data-unlink="true"&gt;&lt;FONT face="times new roman,times" size="3"&gt;&lt;STRONG&gt;&lt;SPAN class=""&gt;Executive Summary&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class="" data-unlink="true"&gt;&lt;FONT face="times new roman,times" size="3"&gt;&lt;STRONG&gt;&lt;SPAN class=""&gt;What was CVE-2021-3560?&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class="" data-unlink="true"&gt;&lt;FONT face="times new roman,times" size="3"&gt;&lt;STRONG&gt;&lt;SPAN class=""&gt;What Does Privilege Escalation Entail?&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class="" data-unlink="true"&gt;&lt;FONT face="times new roman,times" size="3"&gt;&lt;STRONG&gt;&lt;SPAN class=""&gt;How is Polkit Supposed to Work?&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class="" data-unlink="true"&gt;&lt;FONT face="times new roman,times" size="3"&gt;&lt;STRONG&gt;&lt;SPAN class=""&gt;Cortex XDR at Play&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class="" data-unlink="true"&gt;&lt;FONT face="times new roman,times" size="3"&gt;&lt;STRONG&gt;&lt;SPAN class=""&gt;Overview of Lab Setup Script&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class="" data-unlink="true"&gt;&lt;FONT face="times new roman,times" size="3"&gt;&lt;STRONG&gt;&lt;SPAN class=""&gt;Adversary Motion and Vulnerability In Action&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class="" data-unlink="true"&gt;&lt;FONT face="times new roman,times" size="3"&gt;&lt;STRONG&gt;&lt;SPAN class=""&gt;Cortex XDR - Analytics&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class="" data-unlink="true"&gt;&lt;FONT face="times new roman,times" size="3"&gt;&lt;STRONG&gt;&lt;SPAN class=""&gt;Cortex XDR - The Correlation Rule Pivot&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class="" data-unlink="true"&gt;&lt;FONT face="times new roman,times" size="3"&gt;&lt;STRONG&gt;&lt;SPAN class=""&gt;Cortex XDR - The BIOC Pivot&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class="" data-unlink="true"&gt;&lt;FONT face="times new roman,times" size="3"&gt;&lt;STRONG&gt;&lt;SPAN class=""&gt;Conclusion&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class="" data-unlink="true"&gt;&lt;FONT face="times new roman,times" size="3"&gt;&lt;STRONG&gt;&lt;SPAN class=""&gt;Technical Specifications for Lab Work&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class="" data-unlink="true"&gt;&lt;FONT face="times new roman,times" size="3"&gt;&lt;STRONG&gt;&lt;SPAN class=""&gt;Sources&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;H1&gt;&amp;nbsp;&lt;/H1&gt;
&lt;H1&gt;&lt;FONT color="#339966"&gt;&lt;SPAN class=""&gt;Executive Summar&lt;STRONG&gt;y&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/H1&gt;
&lt;HR /&gt;
&lt;P&gt;&lt;FONT face="times new roman,times"&gt;&lt;SPAN&gt;Last year, CVE-2021-3560 was &lt;/SPAN&gt;&lt;A href="https://github.blog/2021-06-10-privilege-escalation-polkit-root-on-linux-with-bug/#conclusion)" target="_blank"&gt;&lt;SPAN&gt;discovered&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt; by a security analyst that allowed for the rapid local privilege escalation of Linux users. This exploit abused a bug that was left in an old version of polkit, being introduced almost 8 years ago. Having many intricate yet simple components toward the exploitation of the vulnerability, this paper will examine the details of polkit, the service exploited in this vulnerability, and how Cortex XDR has the ability to respond to such attacks. This&amp;nbsp; includes initial alerts created and how one can pivot toward the implementation of advanced detection/prevention techniques within Cortex XDR. &lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H1 class=""&gt;&lt;FONT color="#339966"&gt;&lt;SPAN class=""&gt;What was CVE-2021-3560?&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/H1&gt;
&lt;HR /&gt;
&lt;P&gt;&lt;FONT face="times new roman,times"&gt;&lt;SPAN&gt;In May of 2021, security researcher Kevin Backhouse discovered that many popular Linux distributions had shipped a vulnerable version of polkit by default. Polkit is an authorization service typically installed by default on more popular distributions, which was later found to have a local privilege escalation vulnerability built into an old commit. This was first shipped with polkit version 0.113. Kevin also highlighted several popular distributions that came with versions of polkit that were vulnerable at the time: RHEL 8, Fedora 21, and Ubuntu 20.04. Interestingly enough, this seemed to have shipped with more recent distributions, as prior versions (RHEL 7, Fedora 20, Ubuntu 18.04) of the operating systems were not impacted by this vulnerability.&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class=""&gt;&lt;FONT face="times new roman,times"&gt;&amp;nbsp;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="times new roman,times"&gt;&lt;SPAN&gt;This CVE was &lt;/SPAN&gt;&lt;A href="https://nvd.nist.gov/vuln/detail/CVE-2021-3560#match-8115725" target="_blank"&gt;&lt;SPAN&gt;assigned &lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;a base score of 7.8 -High by the National Vulnerability Database (NVD) and was published earlier this year on February 2nd, 2022. Interestingly enough, the addition of the bug for this service was introduced almost 8 years ago, identified by the following &lt;/SPAN&gt;&lt;A href="https://gitlab.freedesktop.org/polkit/polkit/-/commit/bfa5036bfb93582c5a87c44b847957479d911e38" target="_blank"&gt;&lt;SPAN&gt;commit&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;. It was found that, by tricking checks by the dbus (the Linux interprocess communications system), polkit could be tricked into elevating the local privilege of a user. This could allow the creation of a new administrator, provoking a great threat to potential confidential files or sensitive configurations attributed to most Linux servers.  &lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="twolinefix.PNG" style="width: 519px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/43561i50F4DD367599493A/image-dimensions/519x103/is-moderation-mode/true?v=v2" width="519" height="103" role="button" title="twolinefix.PNG" alt="twolinefix.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P class="lia-align-center"&gt;&lt;SPAN&gt;&lt;FONT face="times new roman,times" size="2"&gt;&lt;I&gt;&lt;SPAN&gt;Authentication bypass vulnera&lt;I&gt;bility fix, &lt;A style="font-family: inherit; background-color: #ffffff;" href="https://gitlab.freedesktop.org/polkit/polkit/-/commit/a04d13affe0fa53ff618e07aa8f57f4c0e3b9b81" target="_blank" rel="noopener"&gt;&lt;I&gt;source&lt;/I&gt;&lt;/A&gt;&lt;/I&gt;&lt;/SPAN&gt;&lt;/I&gt;&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class=""&gt;&lt;FONT face="times new roman,times"&gt;&amp;nbsp;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="times new roman,times"&gt;&lt;SPAN&gt;Surprisingly, it was only fixed with a three-line commit (in the figure above).&amp;nbsp; We’ll look into how that came to be in just a moment.&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H1&gt;&lt;FONT color="#339966"&gt;&lt;SPAN class=""&gt;What Does Privilege Escalation Entail?&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/H1&gt;
&lt;HR /&gt;
&lt;P&gt;&lt;FONT face="times new roman,times"&gt;&lt;SPAN&gt;The majority of the time, workstations are designed to include multiple user accounts varying between levels of permission. These permissions, also known as privileges, can grant access to a wide variety of actions for the administrator. This can include the ability to read, write, and execute multiple crucial endpoint configuration files, or provide access to greater communications among other endpoints within a network.&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class=""&gt;&amp;nbsp;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="linuxbasicpermissions.PNG" style="width: 525px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/43558iBD588AA465385FE2/image-dimensions/525x227/is-moderation-mode/true?v=v2" width="525" height="227" role="button" title="linuxbasicpermissions.PNG" alt="linuxbasicpermissions.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P class="lia-align-center"&gt;&lt;EM&gt;&lt;FONT face="times new roman,times" size="2"&gt;Overview of basic r/w/x permissions in Linux, &lt;A href="https://pamirwebhost.com/check-linux-file-permissions-with-ls/" target="_blank" rel="noopener"&gt;source&amp;nbsp;&lt;/A&gt;&lt;/FONT&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="times new roman,times"&gt;&lt;SPAN&gt;Privilege escalation attacks seek to exploit these configured roles through a vulnerability, including programming errors, misconfigurations of access control, or errors in design. Though it has no immediate consequences toward the device that it is initiated upon, it can drive a threat actor to install ransomware onto an endpoint,&amp;nbsp; gain access to private data, or have greater ease of access between multiple systems in a network (similar to lateral movement).&amp;nbsp;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H1 class=""&gt;&lt;FONT color="#339966"&gt;&lt;SPAN class=""&gt;How is Polkit Supposed to Work?&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/H1&gt;
&lt;HR /&gt;
&lt;P&gt;&lt;FONT face="times new roman,times"&gt;&lt;SPAN&gt;Polkit is an authorization toolkit used on Linux operating systems that ensures the user requesting a particular administrative behavior has the right to do so. How often have you seen the following login screen when attempting to change a setting, start a service, or in this case, format a new drive on a Linux endpoint?&amp;nbsp;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class=""&gt;&amp;nbsp; &lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="examplepolkitauth.PNG" style="width: 596px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/43560iFF5C1A00184876D0/image-dimensions/596x356/is-moderation-mode/true?v=v2" width="596" height="356" role="button" title="examplepolkitauth.PNG" alt="examplepolkitauth.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P class="lia-align-center"&gt;&lt;FONT face="times new roman,times"&gt;&lt;FONT face="times new roman,times" size="2"&gt;&lt;I&gt;&lt;SPAN&gt;Example auth required w/ polkit&lt;/SPAN&gt;&lt;/I&gt;&lt;/FONT&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class="lia-align-center"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="times new roman,times"&gt;&lt;SPAN&gt;This is just one example of how polkit functions under a desktop environment, running in the background and providing that decision-making process for the administrator permission in this case. Polkit works with many other groups of actions as well, such as systemd-logind (power off, reboot, suspend, and hibernate the system),&amp;nbsp; and NetworkManager (enable/disable network, wifi, or mobile broadband). This is not limited to the graphical interface as well, as seen in the following SSH instance:&amp;nbsp;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="sshinstanceofpolkit.PNG" style="width: 657px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/43562iD702EAC3E60E9FCB/image-dimensions/657x115/is-moderation-mode/true?v=v2" width="657" height="115" role="button" title="sshinstanceofpolkit.PNG" alt="sshinstanceofpolkit.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P class="lia-align-center"&gt;&lt;FONT face="times new roman,times"&gt;&lt;FONT face="times new roman,times" size="2"&gt;&lt;I&gt;&lt;SPAN&gt; &amp;nbsp;SSH instance of polkit&lt;/SPAN&gt;&lt;/I&gt;&lt;/FONT&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class="lia-align-center"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="times new roman,times"&gt;&lt;SPAN&gt;The sequence of events for the figures above represents the last few steps in the authorization process for polkit. After all, it makes sense to not repeatedly ask a user with an administrator role if they have any local authority, ensuring there is a valid check for sudo privilege beforehand when an administrative action is performed. The vulnerability largely comes into play right before this sequence of events when polkit looks at the UID of the connection initiated by the user.&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="polkitarchitect.PNG" style="width: 489px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/43563iB18EF8370B5CD6F9/image-dimensions/489x439/is-moderation-mode/true?v=v2" width="489" height="439" role="button" title="polkitarchitect.PNG" alt="polkitarchitect.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P class="lia-align-center"&gt;&lt;FONT face="times new roman,times" size="2"&gt;&lt;I&gt;&lt;SPAN&gt;Architecture of polkit in man, &lt;A href="https://www.freedesktop.org/software/polkit/docs/latest/polkit.8.html" target="_self"&gt;source&amp;nbsp; &lt;/A&gt;&lt;/SPAN&gt;&lt;/I&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class="lia-align-center"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="times new roman,times"&gt;&lt;SPAN&gt;The figure of the polkit architecture above describes how each process within the operating system interconnects for this flow of authorization. Normally, right before the stage where the system requests the dialog box presented for the user (through the dbus aka System Message Bus), polkit will ask for the UID as mentioned. This is done through the authentication agent seen in the architecture abovc. In the vulnerability we’ll be looking at, we will see how the dbus will misinterpret an unexpected kill request sent through the command line to escalate local user privileges.&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H1 class=""&gt;&lt;FONT color="#339966"&gt;&lt;SPAN class=""&gt;Cortex XDR at Play&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/H1&gt;
&lt;HR /&gt;
&lt;P&gt;&lt;FONT face="times new roman,times"&gt;&lt;SPAN&gt;As mentioned prior, this type of attack does not immediately entail any damage to the workstation. Throughout a breach, attacker dwell times can last weeks. Earlier in 2022, it was &lt;/SPAN&gt;&lt;A href="https://www.securityweek.com/attacker-dwell-times-down-no-consistent-correlation-breach-impact-mandiant" target="_blank"&gt;&lt;SPAN&gt;identified&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt; that the average intruder dwell time found in 2021 was 21 days. Cortex XDR comes into play rather nicely with this particular incident since it demonstrates its use of multiple informative alerts regarding the attack which can then be used to pivot toward greater detection/prevention techniques.&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H1 class=""&gt;&lt;FONT color="#339966"&gt;&lt;SPAN class=""&gt;Overview of Lab Setup Script&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/H1&gt;
&lt;HR /&gt;
&lt;P&gt;&lt;FONT face="times new roman,times"&gt;&lt;SPAN&gt;To ensure reproduction for additional testing and for educational purposes, a lab setup script has been created. This script is broken down into several sections to capture the setup process and inform the user of the prerequisites required to properly exploit the CVE as outlined by Backhouse.&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Menuofcortexxdrlab.PNG" style="width: 614px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/43564i75309E3F7E0EBE3F/image-dimensions/614x244/is-moderation-mode/true?v=v2" width="614" height="244" role="button" title="Menuofcortexxdrlab.PNG" alt="Menuofcortexxdrlab.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P class="lia-align-center"&gt;&lt;FONT face="times new roman,times"&gt;&lt;FONT face="times new roman,times" size="2"&gt;&lt;I&gt;&lt;SPAN&gt;Menu of Cortex XDR PoC&amp;nbsp; lab checklist script. Found here: &lt;A href="https://github.com/mikefak/XDR-PoC" target="_blank" rel="noopener"&gt;https://github.com/mikefak/XDR-PoC&lt;/A&gt;&lt;/SPAN&gt;&lt;/I&gt;&lt;/FONT&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="times new roman,times"&gt;&lt;SPAN&gt;Though this exploit is vulnerable on various Linux distributions, all of this script’s testing has been performed on an Ubuntu endpoint. This is because of its ease of access for installation and set-up, as other distributions have proven to be difficult to establish environments for in this lab (particularly, Debian Bullseye (testing) and CentOS 8).&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="times new roman,times"&gt;&lt;SPAN&gt;The “Initiate Checklist Scan” option will run through the many subtle requirements needed in order to run the exploit successfully. Keep in mind that the primary threat in regard to this CVE is that most of these conditions are already met upon the installation of the operating system, and Ubuntu 20.04 is a great example of this. It already has the necessary packages accountsservice, gnome-control-center, and polkit installed by default. The only other package that needs to be installed is SSH, which is already commonly installed on endpoints for administrative use.&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="times new roman,times"&gt;&lt;SPAN&gt;Further, the checklist goes through the operating system information and environment it is set to run. The operating system information distinguishes the type of Linux distribution along with if it is known whether or not it is shipped with a vulnerable version of polkit by default. This is helpful since configurations may differ depending on the distribution.&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="examplechecklist.PNG" style="width: 555px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/43565i89F2C5929B28AD17/image-dimensions/555x265/is-moderation-mode/true?v=v2" width="555" height="265" role="button" title="examplechecklist.PNG" alt="examplechecklist.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P class="lia-align-center"&gt;&lt;FONT face="times new roman,times"&gt;&lt;FONT face="times new roman,times" size="2"&gt;&lt;I&gt;&lt;SPAN&gt;Example checklist with all requirements met&lt;/SPAN&gt;&lt;/I&gt;&lt;/FONT&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class="lia-align-center"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="times new roman,times"&gt;&lt;SPAN&gt;The environment is also important, needing to be equipped within an SSH instance. Remember when we distinguished polkit running in a terminal and remote session? Running the exploit within an SSH session is key here because the GUI&amp;nbsp; pop-ups will hinder our efforts to exploit the vulnerability greatly. Since this attack is time-based, it may take several tries to get right. There is no way to exit the prompt aside from entering credentials or clicking on cancel, leaving an SSH instance as a necessary and convenient way to execute the exploit successfully.&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="exampleauthpopup.PNG" style="width: 489px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/43566iA30F5B9A2CB5FEA4/image-dimensions/489x334/is-moderation-mode/true?v=v2" width="489" height="334" role="button" title="exampleauthpopup.PNG" alt="exampleauthpopup.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P class="lia-align-center"&gt;&lt;FONT face="times new roman,times"&gt;&lt;FONT face="times new roman,times" size="2"&gt;&lt;I&gt;&lt;SPAN&gt;Example auth pop up after vulnerability attempt&lt;/SPAN&gt;&lt;/I&gt;&lt;/FONT&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="times new roman,times"&gt;&lt;SPAN&gt;Finally, there are some other miscellaneous checks. A non-root user must be executing the script. After all, what is the point of exploiting the service if the user already has privileged access to create a new user in the first place? Also, there is a check for the Cortex XDR agent installation on the endpoint to ensure the agent is capturing the events of the exploit to better see how privilege escalation attacks can be discovered in the first place. This is done by checking for the existence of the locked account cortexuser in /etc/passwd that is inserted upon agent installation. It is also recommended to ensure connectivity under Endpoints &amp;gt; All Endpoints in the Cortex XDR tenant.&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H1 class=""&gt;&lt;FONT color="#339966"&gt;&lt;SPAN class=""&gt;Adversary Motion and Vulnerability In Action&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/H1&gt;
&lt;HR /&gt;
&lt;P&gt;&lt;FONT face="times new roman,times"&gt;&lt;SPAN&gt;With the power of modern reconnaissance tools in cybersecurity, discovering the operating system version of an endpoint utilizing enumeration tools such as nmap (-o flag) is not difficult. These tools make discovering operating systems with potentially vulnerable packages a lot easier, which can then be used to target exploits similar to the polkit vulnerability shipped with the default installation of the distributions mentioned.&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="times new roman,times"&gt;&lt;SPAN&gt;Beyond this step, a variety of initial access techniques can be initiated to acquire a potential user account on an endpoint. Some popular &lt;/SPAN&gt;&lt;A href="https://attack.mitre.org/" target="_blank"&gt;&lt;SPAN&gt;Mitre techniques&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt; on the attack matrix include phishing, supply chain compromises, or brute force attacks.&amp;nbsp;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="times new roman,times"&gt;At this point of an attack, privilege escalation would likely be one of the next few steps from an attacker's perspective. This could be for persistence, hijacking execution flows, searching for additional credentials, etc.&amp;nbsp; Let's examine how to exploit CVE-2021-3560 from this point on.&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="times new roman,times"&gt;&amp;nbsp;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="times new roman,times"&gt;The primary command used in this attack is “dbus-send”, which is accessible to unprivileged user processes. Dbus-send will ask the accounts-daemon to create a new user for us. The accounts-daemon will then ask polkit if the user creating the new account has sufficient permissions. To do this, polkit will ask for the UID of the user initiating the command. This is right before the authentication agent opens the dialog box we saw prior to authorize users with a password.&amp;nbsp;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="times new roman,times"&gt;&amp;nbsp;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="times new roman,times"&gt;If, when asking for the UID of the user, the request is cancelled, the command will function normally in the sense that it will return an error. The way the error is handled, though, is where the vulnerability comes into play. Rather than throwing out an error and exiting the program, the request is treated as though it came from a process with a UID of 0 (sudo privileges).&lt;/FONT&gt;&lt;/P&gt;
&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="comittcodefixvuln.PNG" style="width: 639px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/43569iFD78DA396507674E/image-dimensions/639x193/is-moderation-mode/true?v=v2" width="639" height="193" role="button" title="comittcodefixvuln.PNG" alt="comittcodefixvuln.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P class="lia-align-center"&gt;&lt;FONT face="times new roman,times"&gt;&lt;FONT face="times new roman,times" size="2"&gt;&lt;I&gt;&lt;SPAN&gt;Commit code that resulted in vulnerability&lt;/SPAN&gt;&lt;/I&gt;&lt;/FONT&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="times new roman,times"&gt;&lt;SPAN&gt;In the commit where the vulnerability was added, we can get a better understanding of where the code falls short here. If the data captured falls into “data.caught_error”, there is no error handling that exists. It will exit next and default to that “ret = TRUE” line at the bottom. With this in mind, the commit to fix the vulnerability makes a lot more sense, having the program properly exit the loop when the error is received. The following code was placed right above the two if statements to fix the vulnerability:&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="vulnfixcomitt.PNG" style="width: 624px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/43570iFA99C707601EA710/image-dimensions/624x125/is-moderation-mode/true?v=v2" width="624" height="125" role="button" title="vulnfixcomitt.PNG" alt="vulnfixcomitt.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P class="lia-align-center"&gt;&lt;FONT face="times new roman,times"&gt;&lt;FONT face="times new roman,times" size="2"&gt;&lt;I&gt;&lt;SPAN&gt;Commit that fixed vulnerability&lt;/SPAN&gt;&lt;/I&gt;&lt;/FONT&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="times new roman,times"&gt;&lt;SPAN&gt;Thomas Claburn said it best in his &lt;/SPAN&gt;&lt;A href="https://www.theregister.com/2021/06/11/linux_polkit_package_patched/" target="_blank"&gt;&lt;SPAN&gt;article &lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;last year talking about the vulnerability: “Error handling? Nah, let's just unlock everything and be done with it”.&amp;nbsp; This is only on one of the code paths where the error can occur according to Backhouse. So, when executing the command and killing it early on, if we hit this codepath, the command will execute as if our UID was 0. Here is an example of what the initial username insertion process may look like:&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="initialaccountinsertion.PNG" style="width: 817px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/43571i7626F8946ACF7C6A/image-dimensions/817x188/is-moderation-mode/true?v=v2" width="817" height="188" role="button" title="initialaccountinsertion.PNG" alt="initialaccountinsertion.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P class="lia-align-center"&gt;&lt;FONT face="times new roman,times"&gt;&lt;FONT face="times new roman,times" size="2"&gt;&lt;I&gt;&lt;SPAN&gt;Initial account insertion&lt;/SPAN&gt;&lt;/I&gt;&lt;/FONT&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class="lia-align-center"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="times new roman,times"&gt;&lt;SPAN&gt;The first dbus-send command sent is requesting the approximate time that the command will take to run. A reminder that this is the command asking the accounts-daemon to create that new account for us. Backhouse has approximated that the time required before abruptly closing the connection is around half of the time it takes to run the command to hit that vulnerable code path.&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="times new roman,times"&gt;&lt;SPAN&gt;So, in the following next two lines, I am sending the command and attempting to create “mfak-eviladmin”. Sleep is utilized here with half of the time I was given in the first command, followed by the kill signal.&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;      &lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="accountinsertionsuccessful.PNG" style="width: 876px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/43578i96976A544CC933F5/image-dimensions/876x104/is-moderation-mode/true?v=v2" width="876" height="104" role="button" title="accountinsertionsuccessful.PNG" alt="accountinsertionsuccessful.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P class="lia-align-center"&gt;&lt;FONT face="times new roman,times"&gt;&lt;FONT face="times new roman,times" size="2"&gt;&lt;I&gt;&lt;SPAN&gt;Account insertion successful&lt;/SPAN&gt;&lt;/I&gt;&lt;/FONT&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="times new roman,times"&gt;&lt;SPAN&gt;This usually takes a few tries, but with some luck, I have now successfully inserted my new user with sudo privileges. The “id” command will show if it is created and prove its existence within the sudo group.&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="times new roman,times"&gt;&lt;SPAN&gt;I can’t exactly login yet since I need to also insert a password attributed with the account. Dbus specifically accepts hashed passwords, so I need to create one with openssl (ex. openssl -passwd -5 evilsecurepassword). Here is what the second insertion may look like:&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt; &lt;/P&gt;
&lt;P class="lia-align-center"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="passwordinsertion.PNG" style="width: 737px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/43579iCCC1C477CAF27B39/image-dimensions/737x313/is-moderation-mode/true?v=v2" width="737" height="313" role="button" title="passwordinsertion.PNG" alt="passwordinsertion.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P class="lia-align-center"&gt;&lt;FONT face="times new roman,times"&gt;&lt;FONT face="times new roman,times" size="2"&gt;&lt;I&gt;&lt;SPAN&gt;&amp;nbsp;Password insertion successful&lt;/SPAN&gt;&lt;/I&gt;&lt;/FONT&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class="lia-align-center"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="times new roman,times"&gt;&lt;SPAN&gt;The command has changed just a bit this time around. “CreateUser” is now “SetPassword” and the hash takes the place of the first string in the command. The UID of the inserted user is also specified in the command, being 1002. Now, the account is accessible via the switch user, or “su” command, and I can enter sudo bash for a root command prompt.&amp;nbsp;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class=""&gt;&lt;FONT face="times new roman,times"&gt;&amp;nbsp;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="times new roman,times"&gt;&lt;SPAN&gt;Here, the sky's the limit with the capabilities I’m able to produce on the endpoint. I can change/edit permissions of configuration files, add persistence users, etc. Let's take a look at how Cortex XDR can respond to the exploit.&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H1 class=""&gt;&lt;FONT color="#339966"&gt;&lt;SPAN class=""&gt;Cortex XDR - Analytics&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/H1&gt;
&lt;HR /&gt;
&lt;P&gt;&lt;FONT face="times new roman,times"&gt;&lt;SPAN&gt;The following tests were performed on an Ubuntu 20.04.2 endpoint with the Cortex XDR agent installed. The agent installation was on version 7.8 and Pro capabilities were enabled on the endpoint. This allows the agent to have a greater scope of capabilities, such as enhanced data collection, advanced responses, and attached add-ons. The exploit was performed multiple times on the same endpoint originating from the unprivileged user “mf-user”. The following evil administrators were created with the exploit: boris and mf-eviladmin.&amp;nbsp;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class=""&gt;&lt;FONT face="times new roman,times"&gt;&amp;nbsp;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="times new roman,times"&gt;&lt;SPAN&gt;As a result of the initial steps to exploit the vulnerability, as seen above, Cortex XDR Analytics covers a lot of initial ground for the visibility of the exploit. This feature examines logs and data to establish an activity baseline to recognize abnormal behavior when it occurs. Since a new user was created with administrator privileges, which then performed reconnaissance to confirm access, Cortex XDR can alert that there may be suspicious activity occurring.&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="lowseverityanalyticsalert.PNG" style="width: 361px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/43580i1B4DFC29FD3ED0BB/image-dimensions/361x458/is-moderation-mode/true?v=v2" width="361" height="458" role="button" title="lowseverityanalyticsalert.PNG" alt="lowseverityanalyticsalert.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P class="lia-align-center"&gt;&lt;FONT face="times new roman,times" size="2"&gt;&lt;I&gt;&lt;SPAN&gt;Low severity Analytics Alert created in a new Incident&lt;/SPAN&gt;&lt;/I&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="times new roman,times"&gt;&lt;SPAN&gt;Here, we can see an incident created and sourced from Cortex XDR’s Analytics engine. As a part of the exploit, multiple discovery commands must be made to see if the inserted user was created along with ensuring root privileges as well. This involves looking through sensitive files, like /etc/passwd or /etc/sudoers. Even simple discovery commands such as “id” to check for our created user also contribute toward unique discovery commands that can be captured by Cortex XDR Analytic Alerts.&amp;nbsp;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="firstbioc.PNG" style="width: 938px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/43582i00AB4DE60410CD2F/image-dimensions/938x75/is-moderation-mode/true?v=v2" width="938" height="75" role="button" title="firstbioc.PNG" alt="firstbioc.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt; &lt;/P&gt;
&lt;P class="lia-align-center"&gt;&lt;FONT face="times new roman,times" size="2"&gt;&lt;I&gt;&lt;SPAN&gt;&amp;nbsp;Informational BIOC from alert&lt;/SPAN&gt;&lt;/I&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class="lia-align-center"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="times new roman,times"&gt;&lt;SPAN&gt;When looking into insights from the alerts provided, numerous informational BIOCs are attributed to the alert created. Alerts like these will not create an incident of their own but will provide context to the alerts attributed to the incident.&amp;nbsp;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class=""&gt;&lt;FONT face="times new roman,times"&gt;&amp;nbsp;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="times new roman,times"&gt;&lt;SPAN&gt;As a security analyst, one could now be curious about the full story regarding the informational&amp;nbsp; BIOCs related to these suspicious Analytic Alerts and relevant insights. Especially in the case of&amp;nbsp; insights like the following where the root user is engaging in discovery commands:&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="biocinsightimage.PNG" style="width: 889px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/43583i7C310480B461C3C9/image-dimensions/889x92/is-moderation-mode/true?v=v2" width="889" height="92" role="button" title="biocinsightimage.PNG" alt="biocinsightimage.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P class="lia-align-center"&gt;&lt;FONT face="times new roman,times" size="2"&gt;&lt;EM&gt; Root user informational BIOC insight&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;DIV id="tinyMceEditormfakhouri_52" class=""&gt;&amp;nbsp;&lt;SPAN&gt; &lt;/SPAN&gt;
&lt;DIV id="tinyMceEditormfakhouri_53" class=""&gt;
&lt;P&gt;&lt;FONT face="times new roman,times"&gt;&lt;SPAN&gt;We can look at the Causality View of the insight by examining it in XQL (right-click menu of insight) and looking at its Causality View in the output of the query (right-click menu of query output). This perspective demonstrates how the insight originated with intelligently built process nodes.&amp;nbsp;  &lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &lt;/P&gt;
&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="causalityviewanalyticsalert.PNG" style="width: 840px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/43587i24B046F684B79493/image-dimensions/840x212/is-moderation-mode/true?v=v2" width="840" height="212" role="button" title="causalityviewanalyticsalert.PNG" alt="causalityviewanalyticsalert.PNG" /&gt;&lt;/span&gt;
&lt;P class="lia-align-center"&gt;&amp;nbsp;&lt;FONT face="times new roman,times" size="2"&gt;&lt;I&gt;&lt;SPAN&gt;Causality Analysis view of alert (Disclaimer: tree shortened for demonstration as a result of testing)&lt;/SPAN&gt;&lt;/I&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="times new roman,times"&gt;&lt;SPAN&gt;Surprisingly, Cortex XDR is able to intelligently identify each step toward the creation of our dbus-send command followed by the enumeration that sets off the insight after gaining access. On the top, we have the initial commands entered for the exploit. This starts from our initial SSH from root to the “mf-user” account, which has only user privileges on the host. The number “42” on the bash icon next to our initial SSH shows the total number of child processes attributed to that particular instance. As mentioned, this exploit takes multiple attempts on both the username and password insertion as well as reconnaissance commands to ensure success. All commands entered in this instance are viewable by clicking on the node and viewing the description. After selecting the node, we can quickly tell that we are dealing with CVE-2021-3560.&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Dbusinsertionattempts.PNG" style="width: 643px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/43588i37365826E83E09C3/image-dimensions/643x258/is-moderation-mode/true?v=v2" width="643" height="258" role="button" title="Dbusinsertionattempts.PNG" alt="Dbusinsertionattempts.PNG" /&gt;&lt;/span&gt;
&lt;P class="lia-align-center"&gt;&amp;nbsp;&lt;FONT face="times new roman,times" size="2"&gt;&lt;I&gt;&lt;SPAN&gt;Dbus-send insertion attempts listed under the bash node&lt;/SPAN&gt;&lt;/I&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="times new roman,times"&gt;&lt;SPAN&gt;On the bottom tree, we can see the exact instance where “mf-user” switches to its created user “boris” and begins enumeration on the endpoint to identify and confirm administrator access. We also see that this extends until the “cat” command that was triggered with Cortex XDR Information Analytics and how we were able to view the chain of processes initially.&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H1 class=""&gt;&lt;FONT color="#339966"&gt;&lt;SPAN class=""&gt;Cortex XDR - The Correlation Rule Pivot&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/H1&gt;
&lt;HR /&gt;
&lt;P class=""&gt;&lt;FONT face="times new roman,times"&gt;&lt;SPAN class=""&gt;With the help of the Analytic Alerts and the wonderful Causality Instance presented, we can now better integrate the information given with a standard working environment. After all, we are given this useful information, but how can a security analyst potentially pivot after seeing suspicious activity such as the exploit above? Beyond the immediate isolation of the endpoint or package updates, the creation of a new detection rule can prove to be useful for future exploitation attempts.&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class=""&gt;&lt;FONT face="times new roman,times"&gt;&amp;nbsp;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class=""&gt;&lt;FONT face="times new roman,times"&gt;&lt;SPAN class=""&gt;When an endpoint policy is configured to monitor and collect enhanced endpoint data, additional insightful information regarding actions performed on the endpoint is collected and queryable via the XQL search query.&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;
&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="XDR Pro enabled.PNG" style="width: 724px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/43589i4A8F80EA723DE558/image-dimensions/724x211/is-moderation-mode/true?v=v2" width="724" height="211" role="button" title="XDR Pro enabled.PNG" alt="XDR Pro enabled.PNG" /&gt;&lt;/span&gt;
&lt;P class="lia-align-center"&gt;&amp;nbsp;&lt;EM&gt;&lt;FONT face="times new roman,times" size="2"&gt;&lt;SPAN class=""&gt;XDR Pro Endpoints enabled via Agent Settings profile&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class=""&gt;&lt;FONT face="times new roman,times"&gt;&lt;SPAN class=""&gt;I can create a search query to look for dbus-send process actions sent on Linux endpoints with the query builder. Here is a basic example query to look for such events:&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class=""&gt;&lt;EM&gt;&lt;FONT face="times new roman,times"&gt;&lt;SPAN class=""&gt;dataset = xdr_data //Endpoint Data Collected by Cortex XDR)&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P class=""&gt;&lt;EM&gt;&lt;FONT face="times new roman,times"&gt;&lt;SPAN class=""&gt;| filter action_process_image_name ~= “dbus-send” //Process instances of the Dbus-send command &lt;/SPAN&gt;&lt;/FONT&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;
&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="basicquerypic.PNG" style="width: 790px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/43590i1A44601FB5CE607A/image-dimensions/790x229/is-moderation-mode/true?v=v2" width="790" height="229" role="button" title="basicquerypic.PNG" alt="basicquerypic.PNG" /&gt;&lt;/span&gt;
&lt;P class="lia-align-center"&gt;&amp;nbsp;&lt;EM&gt;&lt;FONT face="times new roman,times" size="2"&gt;&lt;SPAN class=""&gt;Basic XQL query for "dbus-send"&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P class=""&gt;&lt;FONT face="times new roman,times"&gt;&amp;nbsp;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class=""&gt;&lt;FONT face="times new roman,times"&gt;&lt;SPAN class=""&gt;Here, 21 instances of dbus-send commands have been discovered beyond the description seen above. Along with this, we are given a wide range of information available about every instance of dbus-send. One problem with this is that this will apply to all instances of dbus-send commands being sent. Usually, this can be used as an administrative tool to direct messages toward systems running on any given endpoint. So, by utilizing some more XQL to filter through the information while keeping the exploit in mind, we can alter our XQL to better reflect the available information. The following query was created to address this issue.&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class=""&gt;&lt;EM&gt;&lt;FONT face="times new roman,times"&gt;&lt;SPAN class=""&gt;//XQL Query for CVE-2021-3560&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P class=""&gt;&lt;EM&gt;&lt;FONT face="times new roman,times"&gt;&lt;SPAN class=""&gt;//Multiple dbus send commands via SSH (&amp;gt;=3)&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P class=""&gt;&lt;EM&gt;&lt;FONT face="times new roman,times"&gt;&lt;SPAN class=""&gt;dataset = xdr_data&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P class=""&gt;&lt;EM&gt;&lt;FONT face="times new roman,times"&gt;&lt;SPAN class=""&gt;| filter event_type = ENUM.PROCESS&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P class=""&gt;&lt;EM&gt;&lt;FONT face="times new roman,times"&gt;&lt;SPAN class=""&gt;| filter action_process_image_name ~= "dbus-send"&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P class=""&gt;&lt;EM&gt;&lt;FONT face="times new roman,times"&gt;&lt;SPAN class=""&gt;| filter agent_os_type = AGENT_OS_LINUX&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P class=""&gt;&lt;EM&gt;&lt;FONT face="times new roman,times"&gt;&lt;SPAN class=""&gt;| filter causality_actor_process_image_name = "sshd"&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P class=""&gt;&lt;EM&gt;&lt;FONT face="times new roman,times"&gt;&lt;SPAN class=""&gt;| fields agent_hostname as Linux_Hostname, actor_process_command_line as Command_Executed, actor_process_os_pid as PID, actor_effective_username as Actor_Username, action_process_image_command_line as DBUS_Command, causality_actor_process_image_name, action_process_image_name as DBUS_Action, action_file_path&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P class=""&gt;&lt;EM&gt;&lt;FONT face="times new roman,times"&gt;&lt;SPAN class=""&gt;| comp count(Command_Executed) as Potential_Cred_Insertions by Linux_Hostname, PID, Actor_Username, DBUS_Command, DBUS_Action&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P class=""&gt;&lt;EM&gt;&lt;FONT face="times new roman,times"&gt;&lt;SPAN class=""&gt;| filter Potential_Cred_Insertions &amp;nbsp;&amp;gt;= 3&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P class=""&gt;&lt;EM&gt;&lt;FONT face="times new roman,times"&gt;&lt;SPAN class=""&gt;| sort desc Potential_Cred_Insertions&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class=""&gt;&lt;FONT face="times new roman,times"&gt;&lt;SPAN class=""&gt;This query starts by looking at all endpoint data collected with XDR data. Next, the first four filter commands all help to siphon down potential real cases of dbus-send commands on the endpoint. This includes filtering for process event types, only searching for “dbus-send” commands, searching for only Linux endpoints, and finally searching for causality actors to exist within an SSH instance (which is required by the exploit in most situations).&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class=""&gt;&lt;FONT face="times new roman,times"&gt;&amp;nbsp;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class=""&gt;&lt;FONT face="times new roman,times"&gt;&lt;SPAN class=""&gt;Next, the field commands help organize and control the output for a better understanding of the exploit and what occurred. Finally, the “comp” command on the bottom allows us to count the number of times this command is being executed. To prevent false positives, results must have more than three instances of dbus-send commands executed from the same SSH instance. This can be adjusted depending on the environment on the second to last line. With the tests performed, here’s what the query output &amp;nbsp;looks like:&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;
&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="advancedqueryresults.PNG" style="width: 886px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/43591iCEBAC7432FF386B8/image-dimensions/886x218/is-moderation-mode/true?v=v2" width="886" height="218" role="button" title="advancedqueryresults.PNG" alt="advancedqueryresults.PNG" /&gt;&lt;/span&gt;
&lt;P class="lia-align-center"&gt;&amp;nbsp;&lt;EM&gt;&lt;FONT face="times new roman,times" size="2"&gt;&lt;SPAN class=""&gt;More elaborate XQL Query results&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class=""&gt;&lt;FONT face="times new roman,times"&gt;&lt;SPAN class=""&gt;Here, &amp;nbsp;I get a neat output of each instance of potential credential insertions on the endpoint. What's nice about this output menu as well is the fact that we can see the dbus-command executed, which is a separate entry for both the username and password of the inserted user. This means that we are also able to read the hashed password and potentially decrypt it as well. We also see the hostname of the endpoint, the process ID, the active user, the dbus-commands, the dbus action, and the number of attempted potential credential insertions.&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;
&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="dbuscommand.PNG" style="width: 737px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/43592i6C1D53DF40F1B110/image-dimensions/737x164/is-moderation-mode/true?v=v2" width="737" height="164" role="button" title="dbuscommand.PNG" alt="dbuscommand.PNG" /&gt;&lt;/span&gt;
&lt;P class="lia-align-center"&gt;&amp;nbsp;&lt;FONT face="times new roman,times" size="2"&gt;&lt;EM&gt;&lt;SPAN class=""&gt;Full dbus command to insert a hashed password into the created user&lt;/SPAN&gt;&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class=""&gt;&lt;FONT face="times new roman,times"&gt;&lt;SPAN class=""&gt;You may notice an additional “MF-UbuntuKernelTest” hostname on the output as well. This exploit was tested both on Linux endpoints running the Cortex XDR agent on User Mode and Kernel Mode. This was done because Ubuntu 20.04 by default does not have a compatible kernel version with the XDR agent and must either be run in User Mode (done in the agent settings profile) or by switching to a compatible kernel version. Both appear to provide information about the exploit performed that can be queried by the XQL provided.&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class=""&gt;&lt;FONT face="times new roman,times"&gt;&amp;nbsp;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class=""&gt;&lt;FONT face="times new roman,times"&gt;&lt;SPAN class=""&gt;With this XQL query, we can now create a Correlation Rule to create alerts on new data that is found with the query. A Correlation Rule alerts correlations from multiple sources/events utilizing XQL, which allow us to be notified of these specific conditions for the exploit to occur in. This rule also occurs periodically, initiating the query up to several times a day depending on our preferences.&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;
&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Correlationrulecreation.PNG" style="width: 741px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/43593i905C640383A35EDC/image-dimensions/741x326/is-moderation-mode/true?v=v2" width="741" height="326" role="button" title="Correlationrulecreation.PNG" alt="Correlationrulecreation.PNG" /&gt;&lt;/span&gt;
&lt;P class="lia-align-center"&gt;&amp;nbsp;&lt;EM&gt;&lt;FONT face="times new roman,times" size="2"&gt;&lt;SPAN class=""&gt;Correlation Rule creation&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class=""&gt;&lt;FONT face="times new roman,times"&gt;&lt;SPAN class=""&gt;The Correlation Rule’s primary parameters involve an XQL query, so we can use the one made to create alerts for future attempts to exploit this vulnerability.&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;
&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="correlationrulecontinued.PNG" style="width: 692px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/43594i505503005F7F8AC3/image-dimensions/692x388/is-moderation-mode/true?v=v2" width="692" height="388" role="button" title="correlationrulecontinued.PNG" alt="correlationrulecontinued.PNG" /&gt;&lt;/span&gt;
&lt;P class="lia-align-center"&gt;&amp;nbsp;&lt;FONT size="2"&gt;&lt;EM&gt;&lt;FONT face="times new roman,times"&gt;&lt;SPAN class=""&gt;Correlation Rule creation cont.&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class="lia-align-center"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class=""&gt;&lt;FONT face="times new roman,times"&gt;&lt;SPAN class=""&gt;After implementing the XQL, additional settings can be attributed to our new Correlation Rule. This includes the ability to throw an alert if the XQL query is met. Here, I am naming the alert, providing a description, and selecting privilege escalation as one of Mitre's attack techniques and tactics. Notice that in the alert name and description, I can use variables found from my query for additional information when examining the alert.&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;
&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="correlationrulealert.PNG" style="width: 344px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/43595i61BE97DA5B822E2D/image-dimensions/344x486/is-moderation-mode/true?v=v2" width="344" height="486" role="button" title="correlationrulealert.PNG" alt="correlationrulealert.PNG" /&gt;&lt;/span&gt;
&lt;P class="lia-align-center"&gt;&amp;nbsp;&lt;FONT face="times new roman,times" size="2"&gt;&lt;EM&gt;&lt;SPAN class=""&gt;Corr&lt;/SPAN&gt;&lt;/EM&gt;&lt;/FONT&gt;&lt;FONT face="times new roman,times" size="2"&gt;&lt;EM&gt;&lt;SPAN class=""&gt;elation Rule alert of exploit&lt;/SPAN&gt;&lt;/EM&gt;&lt;/FONT&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-align-center"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class=""&gt;&lt;FONT face="times new roman,times"&gt;&lt;SPAN class=""&gt;After initiating the exploit on the same endpoint again, I am given the alert above that is sourced from our newly created Correlation Rule. Cortex XDR was able to intelligently attribute this alert with the low severity Cortex XDR Analytics generated incident as well, updating its name and description (notice the query variables in the name/description also).&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class=""&gt;&lt;FONT face="times new roman,times"&gt;&amp;nbsp;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class=""&gt;&lt;FONT face="times new roman,times"&gt;&lt;SPAN class=""&gt;With our new Correlation Rule, I can now successfully identify the discrepancy I am looking for in the collected logs, being more than three dbus-send commands initiated via SSH to identify the potential for the polkit vulnerability.&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;
&lt;H1 class=""&gt;&lt;FONT color="#339966"&gt;&lt;SPAN class=""&gt;Cortex XDR - The BIOC Pivot&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/H1&gt;
&lt;HR /&gt;
&lt;P class=""&gt;&lt;FONT face="times new roman,times"&gt;&lt;SPAN class=""&gt;Though the Correlation Rule is a nice and sophisticated way to create an alert for this exploit, it isn’t always the case that this would be the desired route in the first place. After all, dbus-send is already an uncommon administrative command to be initiated on a terminal while also running in an SSH instance. As a result, it may be the case where one would want to outright prevent any sort of activity detected in these circumstances. BIOC rules allow us to create behavioral detecting rules utilizing part of our XQL query, which can then be implemented tow&lt;SPAN class=""&gt;ard our endpoint’s Restrictions Profile to block attack attempts. A BIOC rule can be created under: Detection Rules &amp;gt; BIOC &amp;gt; +Add BIOC.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;
&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="bioccreation.PNG" style="width: 629px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/43596i7D99FC1E834D2D85/image-dimensions/629x453/is-moderation-mode/true?v=v2" width="629" height="453" role="button" title="bioccreation.PNG" alt="bioccreation.PNG" /&gt;&lt;/span&gt;
&lt;P class="lia-align-center"&gt;&amp;nbsp;&lt;FONT face="times new roman,times" size="2"&gt;&lt;EM&gt;&lt;SPAN class=""&gt;BIOC rule creation&lt;/SPAN&gt;&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class="lia-align-center"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class=""&gt;&lt;FONT face="times new roman,times"&gt;&lt;SPAN class=""&gt;Since the visual output of our XQL query is irrelevant if we want to prevent the action, the only XQL logic needed will be our dataset and filters. In this case, rather than waiting for the number of dbus-send attempts to grow beyond three before raising an alert, all instances of dbus-send commands through SSH sessions will be alerted through our BIOC. Aside from that detail, all other information can remain the same as our Correlation Rule regarding the &lt;SPAN class=""&gt;Mitre&lt;SPAN class=""&gt;&amp;nbsp;tactics/techniques and severity.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class=""&gt;&lt;FONT face="times new roman,times"&gt;&amp;nbsp;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class=""&gt;&lt;FONT face="times new roman,times"&gt;&lt;SPAN class=""&gt;This will only begin actively creating alerts whenever each dbus-send command is sent via SSH in comparison to the Correlation Rule’s periodic scan with our XQL query. To begin preventing the initial command, our BIOC must be attributed to our endpoint’s Restriction Profile. Restrictions Profiles can add the custom rule we created with the BIOC and create a prevention rule out of it. This can be performed on the BIOC right-click menu: Right-click a BIOC &amp;gt; Add to Restrictions Profile &amp;gt; Select Applicable Restrictions Profile &amp;gt; Add. The finished result in our profile will look like the following:&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class=""&gt;&lt;FONT face="times new roman,times"&gt;&lt;SPAN class=""&gt; &lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="biocpreventionrule.PNG" style="width: 730px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/43597i9520CCB902EA012B/image-dimensions/730x310/is-moderation-mode/true?v=v2" width="730" height="310" role="button" title="biocpreventionrule.PNG" alt="biocpreventionrule.PNG" /&gt;&lt;/span&gt;
&lt;P class="lia-align-center"&gt;&amp;nbsp;&lt;FONT face="times new roman,times"&gt;&lt;EM&gt;&lt;FONT size="2"&gt;&lt;SPAN class=""&gt;BIOC Rule added to Restrictions Profile&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class=""&gt;&lt;FONT face="times new roman,times"&gt;&lt;SPAN class=""&gt;Here, we are able to see all instances of the BIOC alert being triggered. This indicates that an action was indeed blocked on the endpoint since every time the alert will occur, the BIOC prevents the attack. Let's try to run the exploit again and see what happens.&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;
&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="biocpreventiontest.PNG" style="width: 675px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/43598iCD0D7DFFAE475084/image-dimensions/675x350/is-moderation-mode/true?v=v2" width="675" height="350" role="button" title="biocpreventiontest.PNG" alt="biocpreventiontest.PNG" /&gt;&lt;/span&gt;
&lt;P class="lia-align-center"&gt;&amp;nbsp;&lt;FONT size="2"&gt;&lt;EM&gt;&lt;FONT face="times new roman,times"&gt;&lt;SPAN class=""&gt;BIOC prevention test&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class=""&gt;&lt;FONT face="times new roman,times"&gt;&lt;SPAN class=""&gt;From the test back on the endpoint, I logged into the user account with SSH and executed the username dbus-send insertion. After, my connection to the local host was closed by a remote host.&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class=""&gt;&lt;FONT face="times new roman,times"&gt;&amp;nbsp;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class=""&gt;&lt;FONT face="times new roman,times"&gt;&lt;SPAN class=""&gt;Well… what happened? Did the sleep command go through? Apparently not, since after setting the sleep to 100s, the sleep period was avoided and the connectivity abruptly shut. Because of the crucial timing this exploit requires, it seems the efforts to exploit this vulnerability have been thwarted. My user was also never inserted after checking with the ID command. Let's take a look at a more detailed view of what happened back to the tenant.&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;
&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="preventionalertsonnewincident.PNG" style="width: 750px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/43600i838D651C4F6AE9F2/image-dimensions/750x182/is-moderation-mode/true?v=v2" width="750" height="182" role="button" title="preventionalertsonnewincident.PNG" alt="preventionalertsonnewincident.PNG" /&gt;&lt;/span&gt;
&lt;P class="lia-align-center"&gt;&amp;nbsp;&lt;FONT size="2"&gt;&lt;EM&gt;&lt;FONT face="times new roman,times"&gt;&lt;SPAN class=""&gt;Prevention alerts on new Incident &lt;/SPAN&gt;&lt;/FONT&gt;&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class=""&gt;&lt;FONT face="times new roman,times"&gt;&lt;SPAN class=""&gt;Many new high-severity alerts were created and attributed to the same incident that caught the Correlation alerts, and all were created for each test done on the endpoint. The exploit was attempted multiple times in an effort to see if “sleep” was run in the command chain. As a result, all five of my attempts were prevented with the alert name and description relating to the BIOC rule that I created earlier. &amp;nbsp;The full picture still appears to be a little vague, however, so let's take a proper look at the Causality View of the alert through the right-click menu:&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt; &lt;/P&gt;
&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="bioccausality.PNG" style="width: 748px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/43601i5AD6D04424EBD8ED/image-dimensions/748x357/is-moderation-mode/true?v=v2" width="748" height="357" role="button" title="bioccausality.PNG" alt="bioccausality.PNG" /&gt;&lt;/span&gt;
&lt;P class="lia-align-center"&gt;&amp;nbsp;&lt;FONT face="times new roman,times"&gt;&lt;EM&gt;&lt;FONT size="2"&gt;&lt;SPAN class=""&gt;Causality View of BIOC prevention alert&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class=""&gt;&lt;FONT face="times new roman,times"&gt;&lt;SPAN class=""&gt;With the full Causality View, aspects of our test on the endpoint seem to come together. The chain begins with the Causality Group Owner, being the SSH instance launched by the root user. Further enumeration of log information was done on the next two nodes, which can prove to be incredibly useful in the case of an actual attack, but is irrelevant in this demonstration.&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class=""&gt;&lt;FONT face="times new roman,times"&gt;&amp;nbsp;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class=""&gt;&lt;FONT face="times new roman,times"&gt;&lt;SPAN class=""&gt;Then, the login to the mf-user account is made, and executes additional commands in the bash node that follows. When finally entering the dbus-send command, our BIOC alert triggers, identifiable with the “B” triangle above the final node. With this triggered BIOC, we can see the prevention action initiated on the Causality Group Owner, being the SSH instance beginning with the root user. This series of actions make a lot more sense from what we saw from the endpoint’s perspective with the SSH connection abruptly ending.&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;
&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="causalitygroupownerofhost.PNG" style="width: 776px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/43602i7B1848CB50E0825F/image-dimensions/776x99/is-moderation-mode/true?v=v2" width="776" height="99" role="button" title="causalitygroupownerofhost.PNG" alt="causalitygroupownerofhost.PNG" /&gt;&lt;/span&gt;
&lt;P class="lia-align-center"&gt;&amp;nbsp;&lt;FONT face="times new roman,times"&gt;&lt;EM&gt;&lt;FONT size="2"&gt;&lt;SPAN class=""&gt;Causality Group Owner of exploit prevented&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class=""&gt;&lt;FONT face="times new roman,times"&gt;&lt;SPAN class=""&gt;Closing the SSH connection is great for the prevention of this particular exploit since the consistent way of performing the exploit is now mitigated. Backhouse also notes in the write-up of his discovery of the exploit that “...it's also the reason why the bug wasn’t previously discovered. If you could trigger the vulnerability by killing the dbus-send command immediately, then I expect it would have been discovered a long time ago.” Since the timing is now killed, the exploit attempt will no longer function properly and is successfully prevented.&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;
&lt;H1 class=""&gt;&lt;FONT color="#339966"&gt;&lt;SPAN class=""&gt;Conclusion&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/H1&gt;
&lt;HR /&gt;
&lt;P class=""&gt;&lt;FONT face="times new roman,times"&gt;&lt;SPAN class=""&gt;The exploitation of CVE-2021-3560 allows for remote privilege escalation on Linux endpoints on relatively recent installations of popular distributions, including Ubuntu 20.04, Fedora 21, CentOS 8, and RHEL 8. After deploying the CVE in an environment alongside Cortex XDR, Analytic Alerts were shown to be a powerful form of detection in cases where privilege escalation may occur. Further, when analyzing the Causality Group Owner of insights related to these alerts, the ability to pivot work effort toward prevention/detection rules have also demonstrated relevant use in the case of this exploit when utilizing XQL querying. Correlation and BIOC rules were created as a result, which successfully alerted and prevented this exploit in action.&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;
&lt;H1 class=""&gt;&lt;FONT color="#339966"&gt;&lt;SPAN class=""&gt;Technical Specifications for Lab Work&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/H1&gt;
&lt;HR /&gt;
&lt;P class=""&gt;&lt;FONT face="times new roman,times"&gt;&lt;SPAN class=""&gt;For the purposes of reproduction and testing, here are some of the Technical Specifications on the lab:&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class=""&gt;&lt;FONT face="times new roman,times"&gt;&amp;nbsp;&lt;/FONT&gt;&lt;/P&gt;
&lt;UL class=""&gt;
&lt;LI class=""&gt;&lt;FONT face="times new roman,times"&gt;&lt;SPAN class=""&gt;Host: Ubuntu 20.04.2 LTS&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/LI&gt;
&lt;LI class=""&gt;&lt;FONT face="times new roman,times"&gt;&lt;SPAN class=""&gt;Cortex XDR Agent Version: 7.8.0.70271&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/LI&gt;
&lt;LI class=""&gt;&lt;FONT face="times new roman,times"&gt;&lt;SPAN class=""&gt;Policy Details: XDR Pro, Report Mode on all Malware/Exploit profiles&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;FONT face="times new roman,times"&gt;&lt;FONT face="times new roman,times"&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;Lab Setup Script: &lt;A href="https://github.com/mikefak/XDR-PoC" target="_blank" rel="noopener"&gt;https://github.com/mikefak/XDR-PoC&lt;/A&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="times new roman,times"&gt;XQL Queries, Correlation basic/advanced and BIOC:&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class=""&gt;&lt;FONT face="times new roman,times"&gt;&lt;EM&gt;&lt;SPAN class=""&gt;//Correlation Basic&lt;/SPAN&gt;&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class=""&gt;&lt;FONT face="times new roman,times"&gt;&lt;EM&gt;&lt;SPAN class=""&gt;dataset = xdr_data //Endpoint Data Collected by Cortex XDR)&lt;/SPAN&gt;&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class=""&gt;&lt;FONT face="times new roman,times"&gt;&lt;EM&gt;&lt;SPAN class=""&gt;| filter action_process_image_name ~= “dbus-send” //Process instances of the Dbus-send command&lt;/SPAN&gt;&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class=""&gt;&lt;FONT face="times new roman,times"&gt;&lt;EM&gt;&amp;nbsp;&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class=""&gt;&lt;FONT face="times new roman,times"&gt;&lt;EM&gt;&lt;SPAN class=""&gt;//Correlation Advanced&lt;/SPAN&gt;&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class=""&gt;&lt;FONT face="times new roman,times"&gt;&lt;EM&gt;&lt;SPAN class=""&gt;//XQL Query for CVE-2021-3560&lt;/SPAN&gt;&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class=""&gt;&lt;FONT face="times new roman,times"&gt;&lt;EM&gt;&lt;SPAN class=""&gt;//Multiple dbus send commands via SSH&lt;/SPAN&gt;&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class=""&gt;&lt;FONT face="times new roman,times"&gt;&lt;EM&gt;&lt;SPAN class=""&gt;dataset = xdr_data&lt;/SPAN&gt;&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class=""&gt;&lt;FONT face="times new roman,times"&gt;&lt;EM&gt;&lt;SPAN class=""&gt;| filter event_type = ENUM.PROCESS&lt;/SPAN&gt;&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class=""&gt;&lt;FONT face="times new roman,times"&gt;&lt;EM&gt;&lt;SPAN class=""&gt;| filter action_process_image_name ~= "dbus-send"&lt;/SPAN&gt;&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class=""&gt;&lt;FONT face="times new roman,times"&gt;&lt;EM&gt;&lt;SPAN class=""&gt;| filter agent_os_type = AGENT_OS_LINUX&lt;/SPAN&gt;&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class=""&gt;&lt;FONT face="times new roman,times"&gt;&lt;EM&gt;&lt;SPAN class=""&gt;| filter causality_actor_process_image_name = "sshd"&lt;/SPAN&gt;&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class=""&gt;&lt;FONT face="times new roman,times"&gt;&lt;EM&gt;&lt;SPAN class=""&gt;| fields agent_hostname as Linux_Hostname, actor_process_command_line as Command_Executed, actor_process_os_pid as PID, actor_effective_username as Actor_Username, action_process_image_command_line as DBUS_Command, causality_actor_process_image_name, action_process_image_name as DBUS_Action, action_file_path&lt;/SPAN&gt;&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class=""&gt;&lt;FONT face="times new roman,times"&gt;&lt;EM&gt;&lt;SPAN class=""&gt;| comp count(Command_Executed) as Potential_Cred_Insertions by Linux_Hostname, PID, Actor_Username, DBUS_Command, DBUS_Action&lt;/SPAN&gt;&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class=""&gt;&lt;FONT face="times new roman,times"&gt;&lt;EM&gt;&lt;SPAN class=""&gt;| filter Potential_Cred_Insertions &amp;nbsp;&amp;gt;= 3&lt;/SPAN&gt;&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class=""&gt;&lt;FONT face="times new roman,times"&gt;&lt;EM&gt;&lt;SPAN class=""&gt;| sort desc Potential_Cred_Insertions&lt;/SPAN&gt;&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class=""&gt;&lt;FONT face="times new roman,times"&gt;&lt;EM&gt;&amp;nbsp;&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class=""&gt;&lt;FONT face="times new roman,times"&gt;&lt;EM&gt;&lt;SPAN class=""&gt;//BIOC&lt;/SPAN&gt;&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class=""&gt;&lt;FONT face="times new roman,times"&gt;&lt;EM&gt;&lt;SPAN class=""&gt;dataset = xdr_data&lt;/SPAN&gt;&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class=""&gt;&lt;FONT face="times new roman,times"&gt;&lt;EM&gt;&lt;SPAN class=""&gt;| filter event_type = ENUM.PROCESS&lt;/SPAN&gt;&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class=""&gt;&lt;FONT face="times new roman,times"&gt;&lt;EM&gt;&lt;SPAN class=""&gt;| filter action_process_image_name ~= "dbus-send"&lt;/SPAN&gt;&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class=""&gt;&lt;FONT face="times new roman,times"&gt;&lt;EM&gt;&lt;SPAN class=""&gt;| filter agent_os_type = AGENT_OS_LINUX&lt;/SPAN&gt;&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class=""&gt;&lt;FONT face="times new roman,times"&gt;&lt;EM&gt;&lt;SPAN class=""&gt;| filter causality_actor_process_image_name = "sshd"&lt;/SPAN&gt;&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;
&lt;H1 class=""&gt;&lt;FONT color="#339966"&gt;&lt;SPAN class=""&gt;Sources:&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/H1&gt;
&lt;HR /&gt;
&lt;P class=""&gt;&lt;FONT face="times new roman,times"&gt;&lt;SPAN class=""&gt;&lt;A class="" href="https://www.google.com/url?q=https://www.cvedetails.com/cve/CVE-2021-3560&amp;amp;sa=D&amp;amp;source=editors&amp;amp;ust=1661955252295257&amp;amp;usg=AOvVaw1tt3p8PUO7LnQjV3sHXXsU" target="_blank" rel="noopener"&gt;https://www.cvedetails.com/cve/CVE-2021-3560&lt;/A&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class=""&gt;&lt;FONT face="times new roman,times"&gt;&lt;SPAN class=""&gt;&lt;A href="https://gitlab.freedesktop.org/polkit/polkit/-/issues/140" target="_blank" rel="noopener"&gt;https://gitlab.freedesktop.org/polkit/polkit/-/issues/140&lt;/A&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class=""&gt;&lt;FONT face="times new roman,times"&gt;&lt;SPAN class=""&gt;&lt;A class="" href="https://www.google.com/url?q=https://github.blog/2021-06-10-privilege-escalation-polkit-root-on-linux-with-bug/%23conclusion&amp;amp;sa=D&amp;amp;source=editors&amp;amp;ust=1661955252295815&amp;amp;usg=AOvVaw0oynPK1dtnT8A1rAUFw2BJ" target="_blank" rel="noopener"&gt;https://github.blog/2021-06-10-privilege-escalation-polkit-root-on-linux-with-bug/#conclusion&lt;/A&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class=""&gt;&lt;FONT face="times new roman,times"&gt;&lt;SPAN class=""&gt;&lt;A class="" href="https://www.google.com/url?q=https://www.securityweek.com/attacker-dwell-times-down-no-consistent-correlation-breach-impact-mandiant&amp;amp;sa=D&amp;amp;source=editors&amp;amp;ust=1661955252296442&amp;amp;usg=AOvVaw3GQvzlkt2Z0r8Rz6dBKgzV" target="_blank" rel="noopener"&gt;https://www.securityweek.com/attacker-dwell-times-down-no-consistent-correlation-breach-impact-mandiant&lt;/A&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class=""&gt;&lt;FONT face="times new roman,times"&gt;&lt;SPAN class=""&gt;&lt;A class="" href="https://www.google.com/url?q=https://www.linux.org/docs/man8/polkit.html&amp;amp;sa=D&amp;amp;source=editors&amp;amp;ust=1661955252296865&amp;amp;usg=AOvVaw20CuVM5iySb2fpcIttQjNp" target="_blank" rel="noopener"&gt;https://www.linux.org/docs/man8/polkit.html&lt;/A&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class=""&gt;&lt;FONT face="times new roman,times"&gt;&lt;SPAN class=""&gt;&lt;A href="https://wiki.archlinux.org/title/Polkit" target="_blank" rel="noopener"&gt;https://wiki.archlinux.org/&amp;nbsp;&lt;/A&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class=""&gt;&lt;FONT face="times new roman,times"&gt;&lt;SPAN class=""&gt;&lt;A href="https://attack.mitre.org/" target="_blank"&gt;https://attack.mitre.org/&lt;/A&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 31 Aug 2022 20:08:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-poc-lab-ft-cve-2021-3560/m-p/513649#M2748</guid>
      <dc:creator>mfakhouri</dc:creator>
      <dc:date>2022-08-31T20:08:09Z</dc:date>
    </item>
    <item>
      <title>Re: Cortex XDR PoC Lab ft. CVE-2021-3560</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-poc-lab-ft-cve-2021-3560/m-p/514890#M2818</link>
      <description>&lt;P&gt;Fascinating!&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 14 Sep 2022 21:25:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-poc-lab-ft-cve-2021-3560/m-p/514890#M2818</guid>
      <dc:creator>gjenkins</dc:creator>
      <dc:date>2022-09-14T21:25:48Z</dc:date>
    </item>
    <item>
      <title>Re: Cortex XDR PoC Lab ft. CVE-2021-3560</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-poc-lab-ft-cve-2021-3560/m-p/515041#M2825</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/223246"&gt;@mfakhouri&lt;/a&gt; Great write up. Really appreciate the time you have spent on this.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;Kanwar&lt;/P&gt;</description>
      <pubDate>Fri, 16 Sep 2022 04:29:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-poc-lab-ft-cve-2021-3560/m-p/515041#M2825</guid>
      <dc:creator>KanwarSingh01</dc:creator>
      <dc:date>2022-09-16T04:29:07Z</dc:date>
    </item>
    <item>
      <title>Re: Cortex XDR PoC Lab ft. CVE-2021-3560</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-poc-lab-ft-cve-2021-3560/m-p/515201#M2844</link>
      <description>&lt;P&gt;A truly nice article. Thanks.&lt;/P&gt;</description>
      <pubDate>Sat, 17 Sep 2022 22:39:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-poc-lab-ft-cve-2021-3560/m-p/515201#M2844</guid>
      <dc:creator>nikoolayy1</dc:creator>
      <dc:date>2022-09-17T22:39:58Z</dc:date>
    </item>
    <item>
      <title>Re: Cortex XDR PoC Lab ft. CVE-2021-3560</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-poc-lab-ft-cve-2021-3560/m-p/517638#M3008</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hello Everyone!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I hope that all who followed/practiced the PoC report found it informative and insightful. I'm happy to announce that engineering has reported that this CVE will be implemented as a BTP rule in the upcoming CU-720 (subject to change).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This implementation will likely change the result of the findings after performing this exploit, having a BTP rule integrated to report/block its actions when it is initially performed. BTP can be enabled in your malware profile (Endpoints -&amp;gt; Policy Management -&amp;gt; Profiles -&amp;gt; Edit/Add Malware Profile -&amp;gt; Set the Global Behavioral Threat Protection Rules to Report or Block mode).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Happy Testing! &lt;span class="lia-unicode-emoji" title=":beaming_face_with_smiling_eyes:"&gt;😁&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 12 Oct 2022 15:32:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-poc-lab-ft-cve-2021-3560/m-p/517638#M3008</guid>
      <dc:creator>mfakhouri</dc:creator>
      <dc:date>2022-10-12T15:32:21Z</dc:date>
    </item>
  </channel>
</rss>

