<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Dealing with Execution Vulnerability in Cortex XDR in Cortex XDR Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/dealing-with-execution-vulnerability-in-cortex-xdr/m-p/323038#M51</link>
    <description>&lt;P&gt;Hi Everyone,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;How do you guys deal with&amp;nbsp;Vulnerability reports in Cortex XDR?&lt;/P&gt;&lt;P&gt;After we got Cortex XDR integrated with out PA firewall, I can see some high alerts associated with different vulnerabilities.&lt;/P&gt;&lt;P&gt;The traffic is dropped, thanks to PA firewall. But, what is the best way to approach this.&lt;/P&gt;&lt;P&gt;I can block the host IP's who are performing the attack. But, I would have to do it every time.&lt;/P&gt;&lt;P&gt;What is the best way to deal with it? I was thinking of checking patches on our workstations but other than that can't find a clue.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;One Example:&lt;/P&gt;&lt;P&gt;Draytek Vigor Remote Command Execution Vulnerability&lt;/P&gt;&lt;P&gt;Category: Vulnerability&lt;/P&gt;</description>
    <pubDate>Thu, 16 Apr 2020 03:33:53 GMT</pubDate>
    <dc:creator>Sailesh_Aryal</dc:creator>
    <dc:date>2020-04-16T03:33:53Z</dc:date>
    <item>
      <title>Dealing with Execution Vulnerability in Cortex XDR</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/dealing-with-execution-vulnerability-in-cortex-xdr/m-p/323038#M51</link>
      <description>&lt;P&gt;Hi Everyone,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;How do you guys deal with&amp;nbsp;Vulnerability reports in Cortex XDR?&lt;/P&gt;&lt;P&gt;After we got Cortex XDR integrated with out PA firewall, I can see some high alerts associated with different vulnerabilities.&lt;/P&gt;&lt;P&gt;The traffic is dropped, thanks to PA firewall. But, what is the best way to approach this.&lt;/P&gt;&lt;P&gt;I can block the host IP's who are performing the attack. But, I would have to do it every time.&lt;/P&gt;&lt;P&gt;What is the best way to deal with it? I was thinking of checking patches on our workstations but other than that can't find a clue.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;One Example:&lt;/P&gt;&lt;P&gt;Draytek Vigor Remote Command Execution Vulnerability&lt;/P&gt;&lt;P&gt;Category: Vulnerability&lt;/P&gt;</description>
      <pubDate>Thu, 16 Apr 2020 03:33:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/dealing-with-execution-vulnerability-in-cortex-xdr/m-p/323038#M51</guid>
      <dc:creator>Sailesh_Aryal</dc:creator>
      <dc:date>2020-04-16T03:33:53Z</dc:date>
    </item>
    <item>
      <title>Re: Dealing with Execution Vulnerability in Cortex XDR</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/dealing-with-execution-vulnerability-in-cortex-xdr/m-p/323187#M52</link>
      <description>&lt;P&gt;Hi there,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The current version of Cortex XDR does not have vulnerability scanning.&amp;nbsp; You do have defensive measures against vulnerabilities/exploits via the built in Exploit Prevention Modules (EPMs).&amp;nbsp; On the technique-based exploit side, the EPMs focus on three areas:&amp;nbsp; memory corruption, logic flaws, and malicious code execution.&amp;nbsp; There are several other methods as well.&amp;nbsp; Please check your exploit profile for more info.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The blocks you are seeing in the firewall are derived from signatures.&amp;nbsp; You can view threat details at&amp;nbsp;&lt;A href="https://threatvault.paloaltonetworks.com/" target="_blank"&gt;https://threatvault.paloaltonetworks.com/&lt;/A&gt;.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It may also be worth exploring the newly released Threat Intel Management (TIM) via Cortex XSOAR.&amp;nbsp; You can expand your protections and leverage the threat intel data to proactively block malicious IOCs.&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.paloaltonetworks.com/company/press/2020/palo-alto-networks-introduces-cortex-xsoar--redefines-security-orchestration-and-automation-with-integrated-threat-intel-management" target="_blank"&gt;https://www.paloaltonetworks.com/company/press/2020/palo-alto-networks-introduces-cortex-xsoar--redefines-security-orchestration-and-automation-with-integrated-threat-intel-management&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 16 Apr 2020 15:29:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/dealing-with-execution-vulnerability-in-cortex-xdr/m-p/323187#M52</guid>
      <dc:creator>dfalcon</dc:creator>
      <dc:date>2020-04-16T15:29:32Z</dc:date>
    </item>
  </channel>
</rss>

