<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic BIOC detection for CVE-2023-2033 in Cortex XDR Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/bioc-detection-for-cve-2023-2033/m-p/539083#M4168</link>
    <description>&lt;P&gt;Hi community,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am attempting to create a BIOC detection for&amp;nbsp;&lt;SPAN&gt;CVE-2023-2033.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I can see via host insights there are some machines which are running versions vulnerable to this exploit, however I am looking to create a BIOC to trigger based on chrome being spawned with a version of&amp;nbsp;&lt;SPAN&gt;112.0.5615.121 or less.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;I can't seem to determine which query builder field will need to contain the version number. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Would anyone else have any insight&amp;nbsp;into this?&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 17 Apr 2023 21:54:41 GMT</pubDate>
    <dc:creator>Callum_Crawford</dc:creator>
    <dc:date>2023-04-17T21:54:41Z</dc:date>
    <item>
      <title>BIOC detection for CVE-2023-2033</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/bioc-detection-for-cve-2023-2033/m-p/539083#M4168</link>
      <description>&lt;P&gt;Hi community,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am attempting to create a BIOC detection for&amp;nbsp;&lt;SPAN&gt;CVE-2023-2033.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I can see via host insights there are some machines which are running versions vulnerable to this exploit, however I am looking to create a BIOC to trigger based on chrome being spawned with a version of&amp;nbsp;&lt;SPAN&gt;112.0.5615.121 or less.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;I can't seem to determine which query builder field will need to contain the version number. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Would anyone else have any insight&amp;nbsp;into this?&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 17 Apr 2023 21:54:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/bioc-detection-for-cve-2023-2033/m-p/539083#M4168</guid>
      <dc:creator>Callum_Crawford</dc:creator>
      <dc:date>2023-04-17T21:54:41Z</dc:date>
    </item>
    <item>
      <title>Re: BIOC detection for CVE-2023-2033</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/bioc-detection-for-cve-2023-2033/m-p/539137#M4170</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/182321"&gt;@Callum_Crawford&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Apologies I had to remove my earlier post as using earlier XQL logic you may find the endpoints running that specific chrome version however using this preset &lt;SPAN&gt;you won't be able to create a BIOC rule&lt;/SPAN&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;preset = host_inventory_applications&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;| filter (application_name = "Google Chrome") and version &amp;lt;= "112.0.5615.121"&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Let me check test and share it.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Thanks&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 18 Apr 2023 05:23:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/bioc-detection-for-cve-2023-2033/m-p/539137#M4170</guid>
      <dc:creator>PiyushKohli</dc:creator>
      <dc:date>2023-04-18T05:23:34Z</dc:date>
    </item>
    <item>
      <title>Re: BIOC detection for CVE-2023-2033</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/bioc-detection-for-cve-2023-2033/m-p/539307#M4186</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/182321"&gt;@Callum_Crawford&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Greetings! I have an update on your above Use Case, if I understood correctly you would like to detect endpoints vulnerable to&amp;nbsp;&lt;SPAN&gt;CVE-2023-2033 and has chrome version&amp;nbsp;112.0.5615.121 or less running on that endpoint. Instead of BIOC to achieve&amp;nbsp;this you may &lt;A href="https://docs-cortex.paloaltonetworks.com/r/3/Cortex-XDR-Pro-Administrator-Guide/Correlation-Rule-Details" target="_self"&gt;create Correlation Rule&lt;/A&gt; and the Alert/Incident will be triggered whenever there is match.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;For Testing I tried below logic and it create alert for the use case I understood as shared above.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;dataset = va_cves &lt;BR /&gt;| filter name = "CVE-2023-28293"&lt;BR /&gt;| arrayexpand affected_hosts &lt;BR /&gt;| join type = inner (preset = xdr_process | filter (actor_process_image_name contains "chrome") | dedup agent_hostname ) as end end.agent_hostname = affected_hosts&lt;BR /&gt;| join type = inner (preset = host_inventory_applications | filter (application_name = "Google Chrome") and version &amp;lt;= "112.0.5615.121") as ed ed.endpoint_name = affected_hosts &lt;BR /&gt;| dedup endpoint_name&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;You may further tune the query based on your requirement.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hope this helps!&lt;/P&gt;
&lt;P&gt;Please mark the response as "Accept as Solution" if it answers your query.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Regards.&lt;/P&gt;</description>
      <pubDate>Wed, 19 Apr 2023 07:20:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/bioc-detection-for-cve-2023-2033/m-p/539307#M4186</guid>
      <dc:creator>PiyushKohli</dc:creator>
      <dc:date>2023-04-19T07:20:11Z</dc:date>
    </item>
  </channel>
</rss>

